Skip to main content [aditude-amp id="stickyleaderboard" targeting='{"env":"staging","page_type":"article","post_id":803931,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"business,cloud,dev,security,","session":"A"}']

Yesterday’s NY Times hack also targeted Twitter and the Huffington Post

Image Credit: Dom Dada

Yesterday’s attack that brought the New York Times site down also targeted Twitter and the Huffington Post, CloudFlare says.

The Syrian Electronic Army was allegedly behind the hacking attack, which was essentially a DNS hijack. Attackers exploited vulnerabilities at the Times‘ registrar, MelbourneIT, the company that manages the nytimes.com domain.

[aditude-amp id="flyingcarpet" targeting='{"env":"staging","page_type":"article","post_id":803931,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"business,cloud,dev,security,","session":"A"}']

DNS hijacks work by changing the mapping systems of the Internet that tell browsers where to go in order to get the information they request. Essentially, by changing the map, DNS hijacks reroute traffic from its intended destination service to another.

“The hack illustrates the damage that can be done by redirecting a site’s DNS,” CloudFlare CEO Matthew Prince said in a blog post. “DNS forms the heart of the Internet, not just the web. Email routing, too, depends on DNS to route message to the correct server.”

AI Weekly

The must-read newsletter for AI and Big Data industry written by Khari Johnson, Kyle Wiggers, and Seth Colaner.

Included with VentureBeat Insider and VentureBeat VIP memberships.

Above: How to ensure you have a registry lock in place

Image Credit: CloudFlare

That’s especially dangerous when you consider the emails that might be coming into the Times from confidential sources who do not want their identities exposed.

The attackers also targeted several other domains, including some that belong to Twitter and Huffington Post, CloudFlare said. The company’s engineers participated in a joint effort with the Times, OpenDNS, and Google to track down the attack and discover the other targets.

Due to the nature of the attack, however, even after the issues were corrected, many web surfers continued to be routed to the wrong sites, including at least one that had malware embedded in it. That’s due to the fact that the internet uses multiple DNS servers that update each other with changes to the “map,” and they don’t all update all the time.

In fact, DNS propagation can take as long as 24 hours.

The Syrian Electronic Army is a loosely constituted group that is not officially part of the embattled Syrian government but is composed of “patriotic young people” who are sympathetic to their government and attack those whom they feel spread false news about the messy, bloody Syrian civil war.

The New York Times could have protected itself by having what is called a “registry lock” in place, which prevents domain transfers or changes to the DNS details.

[aditude-amp id="medium1" targeting='{"env":"staging","page_type":"article","post_id":803931,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"business,cloud,dev,security,","session":"A"}']

In fact, having that lock in place is likely the only thing that prevented Twitter.com from suffering the same fate as the Times.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn More