Feeds

Iranian activists deface UK genetics website

1953 and all that

Securing Web Applications Made Simple and Scalable

The UK's Human Genetics Commission website was hit by politically-motivated hackers on Tuesday, who defaced the site with a protest marking a Western plot to overthrow a post-WWII democratically elected leader in Iran.

Dr Mohammed Mossadegh nationalised Iran's petroleum industry before a plot backed by the UK and the US led to his overthrow back in 1953. Quite why the Sun Army defaced the Human Genetics Commission website with digital graffiti is not immediately clear, but Jason Hart - senior European VP of CryptoCard, the security firm that brought the hack to our attention - said that in "order to deface the site they [the hackers] would have had to get admin access".

Iran is something of a hotbed for politically-motivated hack attacks. The Iranian Cyber Army mounted a series of DNS hijacking attacks against first Twitter and later Chinese search engine Baidu in December 2009 and January. The attacks both resulted in the redirection of surfers.

Baidu is suing US-based domain registrar Register.com (no relation) for alleged negligence in facilitating the attacks.

Following the attack, the Human Genetics Commission website was restored to normal operation by Wednesday afternoon. The organisation has thus been able to return to its normal business of advising the UK government on the ethical implications and possible social effects of advances in genetics, such as genetic testing, cloning and stem cell research. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.