It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by SLAYER69
reply to post by serbsta
OMG Twitter is down.
[atsimg]http://files.abovetopsecret.com/images/member/f98c489cac58.png[/atsimg]
YAWN.
Well we'll see just for how long it will be down. Not for long I suspect.
What's next? Email Spam?
[edit on 18-12-2009 by SLAYER69]
Originally posted by piddles
I think it's scary that they can do stuff like this. I'm surprised this hasn't brought on some kind of stern response from the potus
Originally posted by piddles
reply to post by PsykoOps
they=the group of hackers
What kind of government shows off their hacker team and uses them to disrupt another country's very popular website for the sole intention of making a point?
That tweet referenced a story on The Tech Herald, in which reporter Steve Ragan used the clues available, including Dyn's public statements, to theorize that someone compromised a Twitter staffer's e-mail account, presumably via malware that snuck onto the Twitter employee's computer, or through a standard phishing-style identity theft attack.
Once in control of the e-mail account, the hackers then used it to request a password reset for Twitter's account with Dyn, Ragan speculated. "The password reset process is completed, and at this point the person(s) posing as a Twitter staffer gets the reset password via e-mail," Ragan wrote.
That approach makes the most sense, agreed Ray Dickenson, chief technology officer at security vendor Authentium. "That's the most logical explanation," said Dickenson. "If someone obtained administrator credentials for Twitter's account with Dyn, or even if it was inside job, everything worked except the human element."
Dickenson said Dyn's claim that its servers had not been officially hacked is also likely true. "It's very difficult to directly hack a top-tier DNS provider," he said, noting that security at such firms is extremely tight. "You've got to believe that Twitter looked at the options, and made the right choice when it went with Dyn. Twitter's a huge site, and a huge brand."
Also in Dyn's favor, said Dickenson, is the company's contention that only Twitter's DNS records were altered, a fact that York stressed. "The fact that virtually all of Twitter's records were pointing to this defaced site, and that no other [Dyn] customers' records had been altered, corroborates what Dyn's saying."