首页
社区
课程
招聘
Syrian Electronic Army hackers claim to capture Facebook.com
发表于: 2014-2-9 12:28 718

Syrian Electronic Army hackers claim to capture Facebook.com

2014-2-9 12:28
718
新闻链接:
41eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3&6W2N6%4y4Q4x3X3g2Z5K9i4c8T1i4K6u0W2L8%4u0Y4i4K6u0r3j5$3!0F1N6r3g2F1N6q4)9J5c8Y4y4&6M7X3W2S2L8W2)9J5k6r3g2D9k6h3y4@1M7X3!0F1K9h3y4Q4x3X3c8S2M7X3#2&6i4K6u0V1K9r3q4U0K9$3g2J5M7#2)9J5k6r3y4D9j5h3W2E0i4K6u0V1j5$3q4H3N6s2g2J5k6g2)9J5k6r3k6S2j5$3g2T1L8$3!0C8j5$3!0E0
   新闻时间:2014-02-06
   新闻正文:
If you find a good tactic and it works you stick with it, right? That certainly seems to be the case for the Syrian Electronic Army (SEA). Early in 2013 we watched them phish major media organizations in succession.

More recently they have moved on to more sophisticated techniques, mixing together social engineering, phishing, email hijacking and domain hijacking. Today, it was Facebook's turn. It appears the SEA were able to gain access to an administrative panel at DNS provider MarkMonitor.

MarkMonitor prides itself in providing brand protection services, including DNS hosting. Despite the blemish from today's SEA shenanigans, it can still stand reasonably tall because it was able to stop the attack while it was still in progress. They weren't able to totally prevent the incident, however.

[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回