Syrian Electronic Army hacks Microsoft's Office Blogs site
Syrian Electronic Army claim they got access to the blogs.office.com admin panel
IDG News Service - After hijacking several of Microsoft's Twitter accounts and compromising its official blog over the past two weeks, the Syrian Electronic Army hacked into the Microsoft Office Blogs site Monday.
The Syrian Electronic Army (SEA) posted a screenshot on Twitter of the Microsoft Office Blogs site with a rogue article titled "Hacked by the Syrian Electronic Army." The article has since been removed from the site, but is still visible in Google's cache.
The attack happened as Microsoft unveiled a new design for the site Monday. The hacker group posted a screenshot on Twitter of what it claims was the site's old administration panel when it was running on software from Telligent, a developer of online enterprise collaboration and community platforms, and a screenshot of the site's new supposed admin panel, suggesting that it's now running on WordPress.
The screenshots seem to suggest SEA had access to the site before and after the CMS (content management system) switch and support the group's previous claims that it had access to various Microsoft employee accounts.
"Dear @Microsoft, Changing the CMS will not help you if your employees are hacked and they don't know about that," the hacker group said Monday on Twitter.
Following the compromise of the official Microsoft blog on Jan. 11, the company admitted that the email accounts of some of its employees had been compromised.
"A social engineering cyberattack method known as phishing resulted in a small number of Microsoft employee social media and email accounts being impacted," a Microsoft representative said Thursday via email. "These accounts were reset and no customer information was compromised. We continue to take a number of actions to protect our employees and accounts against this industry-wide issue."
The new compromise of the Office Blogs site suggests SEA still has access to some Microsoft employee access credentials that haven't been changed.
"A targeted cyberattack temporarily affected the Microsoft Office blog and the account was reset," a Microsoft representative said Tuesday in an emailed statement. "We can confirm that no customer information was compromised."
SEA is a group of hackers who in the past declared their loyalty to the government of Syrian President Bashar al-Assad. The group has targeted various media organizations, including The New York Times, Financial Times, the Associated Press, The Guardian, BBC and Al Jazeera. Its primary technique for breaking into Twitter accounts and websites is social engineering, primarily phishing.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Cybercrime and Hacking White Papers | Webcasts