Syrian hackers retaliate, deface Anonymous' social network
Counters Anonymous' earlier sabotage of nation's Ministry of Defense site
Computerworld - After the hacking gang Anonymous took credit for defacing Syria's Ministry of Defense website, a Syrian group today retaliated by posting gruesome photos on Anonymous' embryonic social network.
The defacement of AnonPlus -- the site Anonymous set up last month when it was booted off Google+ -- did not include the name of the group responsible.
The University of Toronto's Citizen Lab, based at the Munk School of Global Affairs, however, credited the AnonPlus defacement to the "Syrian Electronic Army" in a message posted to Twitter.
"In response to your hacking to the website of the Syrian Ministry of Defence, the Syrian people have decided to purify the internet of [y]our pathetic website," the defacement read.
The Syrian Electronic Army has been linked to defacements of sites that have posted content critical of the Syrian regime, which has been blasted by the U.S. for its brutal crackdown on anti-government protests.
Today, three Gulf countries -- Saudi Arabia, Bahrain and Kuwait -- recalled their ambassadors to Damascus in protest of President Bashar al-Assad's suppression of the demonstrations.
The defacement of AnonPlus included grisly photographs of burned bodies and claimed that Syrian citizens and military personnel have been killed by demonstrators.
That retaliatory move followed an earlier defacement of the Syrian Ministry of Defense website by Anonymous, the loosely-organized group that has taken responsibility for defacing Turkish government sites, knocking PayPal offline and hacking law enforcement servers.
As of 2 p.m. ET, the Syrian site remained offline, although a screenshot of the defacement remain on the Internet.
"To the Syrian people: The world stands with you against the brutal regime of Basher al-Assad," the defaced site read earlier Monday. "All tyrants will fall, and thanks to your bravery Basher al-Assad is next."
The Syrian Ministry of Defense website is hosted by an ISP in Damascus, according to WHOIS records. Other sites belonging to the Syrian government are also located on the same ISP's servers, including the Ministry of Information, whose website remains online.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
- Cyberattacks could paralyze U.S., former defense chief warns
- Syrian Electronic Army shanghais Microsoft's Twitter account, blog
- Is French outrage against U.S. spying misplaced?
- Lawmakers seek answers on Obamacare Data Hub security
- China-based hacking group behind hundreds of attacks on U.S. companies
- How to Prepare for a Potential Syrian Counterattack on the U.S. Power Grid
- New York Times site outage caused by attack on domain registrar, company says
- Cyber drills like Quantum Dawn 2 vital to security in financial sector
- Quantum Dawn 2 will test Wall Street's cyber readiness
- Pentagon accuses China of cyberattacks on U.S military, business targets
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts