Friday, 14 February 2014

Syrian Electronic Army Breaches the security of Forbes steals user data



The hacking and security expert group proclaim the exploit on Friday, which showing the screenshots of the Wordpress based site Forbes.com. The Hacking group posted a tweet that more than a million user emails and password were stolen successfully and will be made public at the right time. Forbes concede that it’s taking proper fraud prevention techniques still email could be exposed but password are proper encrypted. Forbes requested its reader to change the passwords as precautions. A spoke person of the group has confirmed the attack on Forbes to IBT times. He said it’s not hard to penetrate the security since them using Wordpress as a back end. They sent a mail with malicious link to the employees of Forbes by which they get the login credentials.

Softpediapublished a full report on the attack said “The Syrian Electronic Army has confirmed targeting Forbes. They’ve also confirmed that they’ve breached an administrative account. They’ve provided me with a screenshot of the website’s Wordpress administration panel. The hackers have hijacked three Twitter accounts belonging to Forbes and its employees: @samsharf, @ForbesTech, @TheAlexKnapp. At the time of writing, only the one of Samantha Sharf shows a “Syrian Electronic Army Was Here” messages. The hacktivists tell me that besides posting the articles, they haven’t caused any other damage. They’ve attacked Forbes because the publication has “posted many articles against the SEA, with much hate for Syria.


The SyrianElectronic Army Posted an article on the site, with title “Hacked By Syrian Electronic Army”, which is deleted article and post comes from the group. It is the most active group after hacktivists, they previously hacked into Viber’s databased, hijacked Thomson Reuters Twitter Feed, and make aim at Onion and BBC Twitter accounts. They’ve also hacked lots of Microsoft Twitter accounts. 

Here is the report on How Syrian Electronics Army hacked CNN

No comments:

Post a Comment