Feeds

Pro-Assad hackers break into AFP Photo wire Twitter feed

#apicisworthapprox36tweets

Securing Web Applications Made Simple and Scalable

The Twitter feed of news agency AFP's photo department was hacked yesterday, apparently by supporters of embattled Syrian president Bashar Al-Assad.

The agency's main Twitter account tweeted that any documents or images posted to the photo-dept feed from 16.45 had not come from Agence France-Presse:

AFP eventually suspended the account, which remains down today.

The pictures on the feed were of graphic images from the conflict in Syria, frequently of low quality and accompanied by captions that accused "Obama backed" rebel armies of killing children and using them as soldiers. The tweets also showed images allegedly of citizens supporting Assad or celebrating the arrival of Syrian soldiers.

The Atlantic saved a number of the tweets here, but some contain graphic images that may be disturbing.

The AFP photo feed doesn't have a long reach, since it only has around 3,600 followers and was set up less than two weeks ago, so it's unclear why it was targeted by the hackers - unless it was a case of hacking who you can, rather than who you would like to. The suggestion that the photos were endorsed by the wire service may also have been seen as adding believeability to the message the pics sought to push*.

AFP's security experts have also said that the wire service has been the victim this week of a phishing attack seeking to steal the IDs and passwords of employees by getting them to log into a fake AFP website. They say the attack has been unsuccessful so far but have not said whether the phishing could be related to the Twitter hack. ®

Bootnote

*At least among people unfamiliar with the frequently rather dodgy nature of some photos supplied even by reputable media outfits, which often show evidence of being at the very least creatively amended or photoshopped. An example can be seen here, of an AFP/Getty image in which a Syrian rebel commander in combat seemingly brandishes a weapon which is - apparently - simultaneously belt and drum fed. - Ed

The smart choice: opportunity from uncertainty

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.