SlideShare una empresa de Scribd logo
1 de 20
•
•
•
•
•
•
•
•
•
•
•
•
Adobe Hack
•
•
•
•
Syrian Electronic Army
(Hackers Group)
• The SEA claims responsibility for defacing or
otherwise compromising hundreds of websites
that it contends spread news hostile to the Syrian
government. These include news websites such
as BBC News, the Associated Press, National
Public Radio, Al Jazeera, Financial Times, The
Daily Telegraph,[11] The Washington Post,[12]
Syrian satellite broadcaster Orient TV, and Dubai-
based al-Arabia TV,[5] as well as rights
organizations such as Human Rights Watch.[13]
Other SEA targets include VoIP apps, such as
Viber, and Tango.
Cyber Attacks
• July 2011: University of California Los Angeles website defaced by
SEA hacker "The Pro".[19]
• September 2011: Harvard University website defaced in what was
called the work of a "sophisticated group or individual". The
Harvard homepage was replaced with an image of Syrian president
Bashar al-Assad, with a message saying "Syrian Electronic Army
Were Here".[20]
• April 2012: The Syrian Electronic Army took down the official blog
of social media website LinkedIn. The page was redirected instead
to a site supporting Bashar al-Assad.[21]
• August 2012: The Twitter account of the Reuters news agency was
hacked by the SEA. 22 tweets were sent with false information on
the conflict in Syria. In addition, the Reuters news website was
compromised, and a false report was posted about to a Reuters
journalist's blog.[22]
• 23 April 2013: The SEA hijacked the Associated Press Twitter
account and falsely claimed the White House had been bombed
and President Barack Obama injured.
Cont..
• May 2013: The Twitter account of The Onion was compromised by the
SEA, by phishing Google Apps accounts of The Onion's employees.[18]
• May 2013: The ITV news London Twitter account was hacked on the 24th
May 2013 by the SEA. The Android applications of British Broadcaster Sky
News were also hacked on 26 May 2013 on Google Play Store.
• 17 July 2013, Truecaller servers were allegedly hacked into by the Syrian
Electronic Army.[23] The group claimed on its twitter handle to have
recovered 459 GiBs of database, primarily due to an older version of
Wordpress installed on the servers. The hackers also released TrueCaller's
alleged database host ID, username, and password via another tweet.[24]
On 18 July 2013, Truecaller issued a statement on its blog stating that their
servers were indeed hacked, but claiming that the attack did not disclose
any passwords or credit card information.[25]
• 23 July 2013: Viber servers were allegedly hacked into by SEA as well. The
Viber support website was replaced with a message and a supposed
screenshot of data that was obtained during the intrusion.[26][27][28]
• 27 August 2013: NYTimes.com has its DNS redirected to a page that
displays the message "Hacked by SEA" and Twitter's domain registrar was
changed[30]
BACK
»
»
»
•
•
•
•
»
»
»
»
»
Cyber terrorism (When technology become Weapon)
Cyber terrorism (When technology become Weapon)
Cyber terrorism (When technology become Weapon)

Más contenido relacionado

Similar a Cyber terrorism (When technology become Weapon)

Similar a Cyber terrorism (When technology become Weapon) (8)

News bytes-July 2013
News bytes-July 2013News bytes-July 2013
News bytes-July 2013
 
Syrian Electronic Army takes Down New York Times Website, claims Twitter’s Do...
Syrian Electronic Army takes Down New York Times Website, claims Twitter’s Do...Syrian Electronic Army takes Down New York Times Website, claims Twitter’s Do...
Syrian Electronic Army takes Down New York Times Website, claims Twitter’s Do...
 
Translation article
Translation articleTranslation article
Translation article
 
Newbytes NullHyd
Newbytes NullHydNewbytes NullHyd
Newbytes NullHyd
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social media
 
December 8
December 8December 8
December 8
 
Social media accounts
Social media accountsSocial media accounts
Social media accounts
 
News Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakNews Byte Session By Mukesh Pathak
News Byte Session By Mukesh Pathak
 

Último

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 

Último (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 

Cyber terrorism (When technology become Weapon)

  • 1.
  • 2.
  • 6.
  • 8.
  • 9. Syrian Electronic Army (Hackers Group) • The SEA claims responsibility for defacing or otherwise compromising hundreds of websites that it contends spread news hostile to the Syrian government. These include news websites such as BBC News, the Associated Press, National Public Radio, Al Jazeera, Financial Times, The Daily Telegraph,[11] The Washington Post,[12] Syrian satellite broadcaster Orient TV, and Dubai- based al-Arabia TV,[5] as well as rights organizations such as Human Rights Watch.[13] Other SEA targets include VoIP apps, such as Viber, and Tango.
  • 10. Cyber Attacks • July 2011: University of California Los Angeles website defaced by SEA hacker "The Pro".[19] • September 2011: Harvard University website defaced in what was called the work of a "sophisticated group or individual". The Harvard homepage was replaced with an image of Syrian president Bashar al-Assad, with a message saying "Syrian Electronic Army Were Here".[20] • April 2012: The Syrian Electronic Army took down the official blog of social media website LinkedIn. The page was redirected instead to a site supporting Bashar al-Assad.[21] • August 2012: The Twitter account of the Reuters news agency was hacked by the SEA. 22 tweets were sent with false information on the conflict in Syria. In addition, the Reuters news website was compromised, and a false report was posted about to a Reuters journalist's blog.[22] • 23 April 2013: The SEA hijacked the Associated Press Twitter account and falsely claimed the White House had been bombed and President Barack Obama injured.
  • 11. Cont.. • May 2013: The Twitter account of The Onion was compromised by the SEA, by phishing Google Apps accounts of The Onion's employees.[18] • May 2013: The ITV news London Twitter account was hacked on the 24th May 2013 by the SEA. The Android applications of British Broadcaster Sky News were also hacked on 26 May 2013 on Google Play Store. • 17 July 2013, Truecaller servers were allegedly hacked into by the Syrian Electronic Army.[23] The group claimed on its twitter handle to have recovered 459 GiBs of database, primarily due to an older version of Wordpress installed on the servers. The hackers also released TrueCaller's alleged database host ID, username, and password via another tweet.[24] On 18 July 2013, Truecaller issued a statement on its blog stating that their servers were indeed hacked, but claiming that the attack did not disclose any passwords or credit card information.[25] • 23 July 2013: Viber servers were allegedly hacked into by SEA as well. The Viber support website was replaced with a message and a supposed screenshot of data that was obtained during the intrusion.[26][27][28] • 27 August 2013: NYTimes.com has its DNS redirected to a page that displays the message "Hacked by SEA" and Twitter's domain registrar was changed[30] BACK
  • 13.
  • 15.
  • 17. »