It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Twitter down, reportedly hacked by "Iranian Cyber Army"

page: 3
2
<< 1  2   >>

log in

join
share:

posted on Dec, 19 2009 @ 12:34 PM
link   
I think it's scary that they can do stuff like this. I'm surprised this hasn't brought on some kind of stern response from the potus




posted on Dec, 19 2009 @ 12:51 PM
link   

Originally posted by SLAYER69
reply to post by serbsta
 




OMG Twitter is down.

YAWN.

Well we'll see just for how long it will be down. Not for long I suspect.
What's next? Email Spam?




[edit on 18-12-2009 by SLAYER69]


LMAO. Whats next? Hopefully Paypal...Can't stand'em



posted on Dec, 19 2009 @ 12:54 PM
link   
reply to post by schrodingers dog
 


They even have a gmail account.

Oh google, what can't ypu do?




posted on Dec, 19 2009 @ 01:24 PM
link   

Originally posted by piddles
I think it's scary that they can do stuff like this. I'm surprised this hasn't brought on some kind of stern response from the potus


You're kidding right? I mean this kind of stuff has been going on since the internet became public. And who are 'they' exactly anyway?



posted on Dec, 19 2009 @ 02:47 PM
link   
reply to post by PsykoOps
 


they=the group of hackers

What kind of government shows off their hacker team and uses them to disrupt another country's very popular website for the sole intention of making a point?



posted on Dec, 19 2009 @ 03:51 PM
link   
omg we must nuke them for this attack ...just kidding.. im more upset that mininova has went down with all hands, only a few pieces of wreckage are visible....



posted on Dec, 19 2009 @ 04:03 PM
link   
reply to post by serbsta
 


Its particularly funny to watch HUGE social sites like that ''drop the ball'' and succumb to bad english troublemakers. What exactly was their objective? lol Thats quite funny.



posted on Dec, 19 2009 @ 04:26 PM
link   
More US/ Israeli propaganda to drum up support to illegally bomb Iran.



posted on Dec, 19 2009 @ 07:07 PM
link   

Originally posted by piddles
reply to post by PsykoOps
 


they=the group of hackers

What kind of government shows off their hacker team and uses them to disrupt another country's very popular website for the sole intention of making a point?



I haven't seen any government hacker teams. Did I miss something perhaps?



posted on Dec, 19 2009 @ 07:53 PM
link   
reply to post by PsykoOps
 


it said that they were representing Iran's government, in response to people posting what was really happening in Iran during the election.

www.washingtonpost.com...


edit: when I say government hacker teams, I refer to their own group of technical specialists, be it by contract or straight up working for them. I'm pretty sure most big countries have them.

edit 2: I just read something that sort of changes my mind on the whole issue. Good Day

[edit on 19-12-2009 by piddles]



posted on Dec, 20 2009 @ 01:14 AM
link   
Oh ok, yeah I know what it said on the page but that's about as reliable as asking 4 year old for political advice. And since it was a simple dns hijack it was likely some script kiddie playing around.



posted on Dec, 20 2009 @ 02:21 AM
link   
I'll be worried when they start launching our own nukes at us or something. Taking down Twitter on the other hand doesn't even annoy me, if anything I'd applaud the group that did this if not for the fact that it was a very poorly translated message. If only they'd try taking on 4chan, now that would be a fun internet war to watch.



posted on Dec, 20 2009 @ 02:42 AM
link   

That tweet referenced a story on The Tech Herald, in which reporter Steve Ragan used the clues available, including Dyn's public statements, to theorize that someone compromised a Twitter staffer's e-mail account, presumably via malware that snuck onto the Twitter employee's computer, or through a standard phishing-style identity theft attack.

Once in control of the e-mail account, the hackers then used it to request a password reset for Twitter's account with Dyn, Ragan speculated. "The password reset process is completed, and at this point the person(s) posing as a Twitter staffer gets the reset password via e-mail," Ragan wrote.

That approach makes the most sense, agreed Ray Dickenson, chief technology officer at security vendor Authentium. "That's the most logical explanation," said Dickenson. "If someone obtained administrator credentials for Twitter's account with Dyn, or even if it was inside job, everything worked except the human element."

Dickenson said Dyn's claim that its servers had not been officially hacked is also likely true. "It's very difficult to directly hack a top-tier DNS provider," he said, noting that security at such firms is extremely tight. "You've got to believe that Twitter looked at the options, and made the right choice when it went with Dyn. Twitter's a huge site, and a huge brand."

Also in Dyn's favor, said Dickenson, is the company's contention that only Twitter's DNS records were altered, a fact that York stressed. "The fact that virtually all of Twitter's records were pointing to this defaced site, and that no other [Dyn] customers' records had been altered, corroborates what Dyn's saying."


Looks like a single Twitter staffer slip up some how and gave the hackers access to their e-mail account, using that the hackers requested a password reset and then logged into Twitters DNS records as if they were staff.... Pretty much about as complicated as hacking into your friends Facebook profiles and putting up incriminating pictures


At least the DNS servers them selves weren't hacked - if that becomes common place they the internet will be chaotic until they fixed the security hole - nah just a staffer falling for a pishing scam, or some key logging software maybe.



posted on Jan, 6 2010 @ 12:25 AM
link   
they highjacked TWITTER??
who was the leader of the terrorist group?
Tom from Myspace?



new topics

top topics



 
2
<< 1  2   >>

log in

join