Feeds

Syrian Electronic Army claims Obama social media hijacking

Hacked non-profit emails gave access to URL shortener ... and mayhem!

SANS - Survey on application security programs

The Syrian Electronic Army has been up to its old tricks again, this time claiming to have infiltrated president Barack Obama’s official Twitter and Facebook accounts, and re-election web site.

A series of tweets were sent from @BarackObama account and updates were made to the president’s Facebook account on Monday linking to a YouTube video from the pro-Assad hacktivist collective.

Rather than hack the accounts themselves, those responsible appear to have achieved their aims by compromising URL shortening service ShortSwitch, researchers at Symantec said.

The website donate.barackobama.com was temporarily redirected to the Syrian Electronic Army site, according to The Hacker News.

Some tweets from the SEA’s official account seemed to confirm the reports.

It appears the SEA got the info it needed to launch its attack by hacking staff emails from the non-profit which runs Obama’s website, Twitter account and Facebook account - Organizing For Action (OFA).

The SEA told Mashable that OFA staff “didn't even enabled (sic) two-step verification” on their Gmail accounts.

As pointed out by Symantec, the OFA emails could have been targeted in the same way as those at The Onion earlier this year, with staff sent phishing emails linking to spoofed Google Apps login pages.

The security firm had the following advice for Google Apps users and admins:

Two-factor authentication for email is an important security feature that should be enabled. In the scenarios such as the one above, two-factor authentication would have helped the staff members of OFA mitigate an attempt by hackers to obtain access to the Obama campaign’s Google Apps email account.

If you are a Google Apps administrator, Symantec Security Response recommends turning on the two-factor authentication feature. Follow these instructions to allow two-factor authentication (2-step verification).

Google Apps administrators also have the option to “enforce” two-factor authentication, making it mandatory for all users of that domain. Please refer to Google’s help page for how to enable this feature.

The Syrian Electronic Army has claimed several high profile successes in the past few months, including web site defacements of CNN, Time and other media companies, and a data slurp of chat app Tango.

Obama's social media accounts and web site now appear to be back to normal. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.