Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
The Syrian Electronic Army has compromised a number of news websites – apparently through DNS redirects via Gigya, a customer identity management platform used by all the sites.
Visitors to the site were shown the following image:
The Telegraph admitted it had been "compromised" and blamed a part of the website operated by a "third party", a party El Reg has since learned is Gigya.
A part of our website run by a third-party was compromised earlier today. We've removed the component. No Telegraph user data was affected.— The Telegraph (@Telegraph) November 27, 2014
“Some calls to Gigya domains were redirected to the hackers site or showed a hacking message to end users”, Gigya said in a statement.
“It might take some time until the changes propagate to all users. We have worked with GoDaddy to resolve the issue and the redirection was removed.”®
Sponsored: Global DDoS threat landscape report