The Syrian Electronic Army: Lessons to be learned
Davey Winder probes just who is doing just what and why, and asks what enterprises can learn from it.


Kenneth Geers, Senior Global Threat Analyst with FireEye, condenses his security advice into three easy lessons that every enterprise IT security department can takeaway:
Lesson #1: Techies must follow the news! With looming Western intervention in Syria, it was only logical that the hacktivist SEA would escalate its attacks, and that a key battleground for public opinion would be US media sites. Indeed, SEA targeted US newspapers, the US Marine Corps, and even a US college sports site, redirecting internet users to pro-Syria propaganda.
Because patriotic hackers seek free PR for their cause, there is a simple calculation here: the more visitors your site has, the more they want to attack it.
Lesson #2: Protect your flank. Sometimes, hackers use a frontal assault, such as by sending the victim a blizzard of meaningless data to achieve a denial-of-service. But if the front door is guarded, hackers can also ambush a target from the side, by exploiting third-party business relationships and data dependencies.
Admirals and Generals are taught to protect their flanks, but what about System Administrators? SEA tagged Twitter, New York Times, and other sites by sabotaging their Domain Name System (DNS) records, after finding weak links in their data supply chains.
Lesson #3: Train for social engineering. The SEA has used spear phishing, malformed URLs, and booby-trapped images of osculating movie stars to compromise their targets. Civilian website owners could use a little more military discipline. The Marine Corps hack, for example, was not in the .mil domain, but a recruiting site in the .com domain. For help, try two-factor authentication, locked domains, DNSSEC, and preparations to bypass DNS altogether by replacing human-readable addresses like www.nytimes.com with a computer-friendly IP address such as 170.149.168.130.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Davey is a three-decade veteran technology journalist specialising in cybersecurity and privacy matters and has been a Contributing Editor at PC Pro magazine since the first issue was published in 1994. He's also a Senior Contributor at Forbes, and co-founder of the Forbes Straight Talking Cyber video project that won the ‘Most Educational Content’ category at the 2021 European Cybersecurity Blogger Awards.
Davey has also picked up many other awards over the years, including the Security Serious ‘Cyber Writer of the Year’ title in 2020. As well as being the only three-time winner of the BT Security Journalist of the Year award (2006, 2008, 2010) Davey was also named BT Technology Journalist of the Year in 1996 for a forward-looking feature in PC Pro Magazine called ‘Threats to the Internet.’ In 2011 he was honoured with the Enigma Award for a lifetime contribution to IT security journalism which, thankfully, didn’t end his ongoing contributions - or his life for that matter.
You can follow Davey on Twitter @happygeek, or email him at davey@happygeek.com.
-
Engineering firms see little productivity benefit from use of AI
News While engineering firms are keen on ramping up the use of AI, many aren't fully unlocking value due to botched adoption strategies and legacy technology.
-
M&S aims for full online restoration within four weeks following major cyber attack
News M&S CEO Stuart Machin says the high street retailer plans to fully restore operations by August following a devastating cyber attack in April.