Connect with us

Hi, what are you looking for?


Incident Response

How The Syrian Electronic Army Pwned Some of The Internet’s Biggest Brands

The New York Times and Twitter are the latest online brands that have fallen victim to service-disrupting cyber attacks. 

The New York Times and Twitter are the latest online brands that have fallen victim to service-disrupting cyber attacks. 

The website for The New York Times was out of service for hours on Tuesday and into early Wednesday following the attacks which for a time redirected users to a malicious server controlled by the Syrian Electronic Army (SEA).

In addition to the New York Times, at least one domain operated by Twitter was affected by the attack, which caused problems for users trying to view images and photos on the service.

In the case of both attacks, neither utilized advanced hacking techniques to compromise servers or users’ systems via exploits or other means. In fact, the attacks were executed using simple phishing methods that enabled attackers to gain access to online accounts that controlled the domain name services (DNS) for the popular web sites.

The targeted domains are hosted at domain registrar, Melbourne IT. The attackers managed to compromise the customer accounts via successful phishing attacks, which enabled them to modify the name servers for and and hijack the sites.

Late Tuesday, Melbourne IT confirmed to SecurityWeek that a targeted phishing attack was used to gain access to the credentials of users of a Melbourne IT reseller account.  

“Melbourne IT is aware that an account that held multiple domain names was accessed on Melbourne IT’s systems using a valid username and password for that account,” a company spokesperson told SecurityWeek in an emailed statement.

Advertisement. Scroll to continue reading.

“The DNS records of several domain names on that account were changed – including,” the statement added.

Twitter issued the following update Tuesday evening in response to the domain compromise:

 “At 20:49 UTC, our DNS provider experienced an issue in which it appears DNS records for various organizations were modified, including one of Twitter’s domains used for image serving, Viewing of images and photos was sporadically impacted. By 22:29 UTC, the original domain record for was restored.  No Twitter user information was affected by this incident.”

Marc Frons, chief information officer for The New York Times, said in a statement Tuesday afternoon that the outage was “the result of a malicious external attack by the Syrian Electronic Army “or someone trying very hard to be them.” Employees were warned to “be careful when sending e-mail communications until this situation is resolved.”

“Since the cache TTL on the [ Domain] was relatively short, shortly after the domain was revoked traffic largely stopped flowing to the malware infected sites,” Matthew Prince, CEO at CloudFlare explained in a blog post. “That did not mean all hacked sites came back online. In some places, DNS recursors continue to have the cached bad records. They will expire over the next 24 hours and traffic to sites will return to normal.”

Ironically, the Syrian Electronic Army made use of Twitter to brag about hacking the service the service the group actually uses to communicate with the outside world.

“Media is going down,” a Tweet from the SEA Twitter account said, followed by “Twitter, are you ready?”

Not long after, another Tweet read: “Hi @Twitter, look at your domain, its owned by #SEA 🙂”.

The attacks are assumed to be in protest to possible military action by the United States against Bashar al-Assad’s regime for alleged use of chemical weapons against civilians in the country’s ongoing war.

While Melbourne IT did not share the specific phishing email, a spokesperson told SecurityWeek that the “from address” was faked but made to look like the email was from a trusted person known to the victim. Also, as would be expected in a typical phishing attack, the content of the email “seemed like something the trusted person might send, and the link in the email was an image that looked like a legitimate website.”

What should have alerted victims was that fact that the website asking the user to enter their credentials was a different web address to the one appearing in the phishing email.

The company said that after they were notified, the affected DNS records were changed back to their previous values and the affected records were locked from any further changes at the .com domain name registry. The company also temporarily suspended access to affected user accounts until passwords were changed.

“We are currently reviewing our logs to see if we can obtain information on the identity of the party that has used the account credentials. We are also reviewing additional layers of security that we can add to our accounts,” Melbourne IT said.

According to the domain name records on Tuesday afternoon, the Syrian Electronic Army was listed as a contact for several compromised domains, all of which used Melbourne IT as their domain registrar.

According to OpenDNS, several other high profile domains were hijacked at the DNS level and were redirecting traffic to a server hosting malware and phishing sites hosted at the IP address  Other high profile domains affected include ShareThis and The Huffington Post.

AlienVault’s Jaime Blasco has provided a list of domains (at one time) pointing to the server assumed to be operated by the Syrian Electronic Army.

Melbourne IT suggested that domain name owners take advantage of additional registry lock features available from domain name registries.

“Registrars generally do not make it easy to request registry locks because they make processes like automatic renewals more difficult,” CloudFlare’s prince explained. “However, if you have a domain that may be at risk, you should insist that your registrar put a registry lock in place. It’s worth noting that while some of Twitter’s utility domains were redirected, was not — and has a registry lock in place.”

While implementing registry locks is a wise decision, it’s important to remember that registrar systems are only as secure as the devices accessing them. For example, as programmer Florian Bösch pointed out, if any staff member with administrative access is infected by a keylogger on any machines used to access administrative functions, it’s “game over for the entire system.”

“While a company like NYT may be able to secure their own platforms, harden their systems and regularly check for vulnerable components on premise – it is a much harder practice when some of that infrastructure is provided by a third party like an ISP or a DNS Hoster, said Imperva web research team leader Tal Be’ery. “At some point, CIO’s need to realize that critical pieces of their online entities are controlled by vendors, and that security policies should apply to them as well. Companies should create contingency plans, and check the security measurements taken by their 3rd party content and infrastructure providers. A DNS is unfortunately, a great example.”

The Syrian Electronic Army has been responsible for other recent attacks, including ones that targeted the AFP’s Twitter account and three CBS News accounts, in order to spread propaganda supporting Syria’s President Assad. In May, the group hacked into the Associated Press’s Twitter account and falsely reported that President Barack Obama had been injured after two blasts at the White House. The Washington Post website was also hacked earlier this month in an attack blamed on the SEA. 

Related Reading:

Five DNS Threats You Should Protect Against

Are Your Domains Safe? Five Ways to Safeguard Your Domain Name and Website 

Network Solutions’ June “Snafu” – Why Heads Should Roll

 The Three Providers Who Decide Whether You Will Be Hacked

*Updated with additional commentary

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Incident Response

Meta has developed a ten-phase cyber kill chain model that it believes will be more inclusive and more effective than the existing range of...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Artificial Intelligence

Two new surveys stress the need for automation and AI – but one survey raises the additional specter of the growing use of bring...