IRGC cyber section hits back
IRGC cyber section hits back
NOT 3:00 HOURS.
A URL-shortening service that condenses long Web addresses for use on micro-blogging sites like Twitter was hacked over the weekend, sending millions of users to an unintended destination, a security researcher said today.
After Cligs, a rival to the better known TinyURL and bit.ly shortening services, was attacked Sunday, more than 2.2 million Web addresses were redirected to Kevin Saban's blog, which appears on the Orange County Register's Web site. Noticing a dramatic upswing in traffic, Saban -- who uses Cligs in his Twitter messages to shorten URLs -- contacted Pierre Far, the creator of Cligs.
"Quite curious," was how Graham Cluley, a senior technology consultant with security company Sophos, put it. "Our first thought was that it was a spam campaign, that the hack would redirect [users] to a porn site perhaps, but it seems that [Saban] was entirely innocent. Very bizarre."
Cluley's take was fueled by the assumption that the vast majority of criminal activity on the Internet is based on the profit motive, and here there didn't seem to be one. "Maybe this was a mistake on the part of the hackers," he said. "Maybe they just got the [shortened] URL wrong, and meant to direct users to a different site."
Cluley's point: "There was one single point of failure here," he said. "They only had to hack one thing, the Cligs service, to affect millions of URLs."
Early yesterday, Cligs acknowledged the hack, which had exploited a vulnerability in its editing function. "I've identified the hole and disabled all cligs editing for now and I'm restoring the URLs back to their original destination states," said Far, Cligs' creator, in a blog post. "However, the most recent backup is from early May, and so we may have lost all URLs created since then. My daily backups with my host were turned off for some reason, which is another story.
Far said that the attacker's IP address resolved to a Canadian address.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
If the resistance can mount enough dos attacks they could take Iran off the Internet,
bring the current regime to its knees, closing down phones, TV, ATM, commerce,
and Military com.
http://warintel.blogspot.com/2009/06/effects-of-bringing-down-irans-www.html
And there isn't much Iran can do about it.
We expect the rest of the world will join in
on the dos attacks and take Iran's WWW
down. Methods and analysis here.
Most will be using the new VPNs.
Gerald
Tactical Internet Systems analyst.
Hezbillahs cyber division is trying to help.
http://warintel.blogspot.com/2008/06/hezbollahs-cyber-warfare-program.html
Expect general STRIKE SOON.
UPDATE: Here’s the latest wrinkle in the online conflict, according the activists’ Twitter streams. The government is filtering text-message traffic, and Secure Socket Layer-protected web sites. That’s making itmuch harder for pro-democracy types to communicate with each other — and with the outside world. In response, the activists are calling for renewed assaults on government web pages. “Iranian gvmt is blocking out all INTERNET/SMS/PHONE - as long as they do this, we cut down THEIR sites,” one Tweets.
.
Labels: IRGC cyber section hits back
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home