Twitter, The New York Times and other prominent websites were struck by a powerful cyberattack that continued affecting other websites into Tuesday evening, directing visitors to a site purportedly controlled by the Syrian Electronic Army (SEA).
The attackers apparently struck an Australian IT services company, Melbourne IT, which provides domain name registration services. The pro-Syrian government SEA has recently conducted several high-profile attacks against media and other websites.
It appears that the hackers modified master DNS (Domain Name System) entries, allowing them to replace the correct IP addresses for Twitter.com and NYTimes.com with their own, said David Ulevitch, CEO and founder of the security company OpenDNS.
OpenDNS monitors when domains are redirected, and it appeared the attack was continuing into the evening U.S. time, Ulevitch said.
DNS is a distributed address book for websites. It allows a domain name, such as idg.com, to be translated into an IP addresses that can be called into a browser. Attacks against DNS can be powerful, as it can shift lots of traffic suddenly to a website controlled by an attacker, which could then pose further risk for visitors inadvertently pushed there.
The Twitter.com and NYTimes.com domains are listed as being registered with Melbourne IT, according to "whois," the domain name registration database.
As a domain name registrar, Melbourne IT holds the master DNS record, Ulevitch said. It would appear that the affected sites, some of which were listed by security vendor AlienVault Labs, have their master DNS records with Melbourne IT.
There are a few ways hackers could modify a DNS record. A hacker could obtain the access credentials needed to modify an organization's DNS record with a registrar such as Melbourne IT. Ulevitch said that kind of hack is unlikely in this case since so many websites were redirected.
It is more likely that the attackers gained access to Melbourne IT's infrastructure, he said. Melbourne IT officials could not be immediately reached on Wednesday morning.
DNS hacks can have other serious consequences. Redirecting The New York Times' domain name also means email to and from the company could have been redirected to the server controlled by the attacker.
"If you're a confidential source for The New York Times and sending an email that's rerouted to another mail server, you've just blown your cover," Ulevitch said.
In a news story, the newspaper wrote that "the attack also forced employees of The Times to take care in sending e-mails."
Also, the website that people are being redirected to could also be engineered to check if visitors have unpatched software vulnerabilities that could be used to infect their computers with malware.
Since the websites in this attack have high traffic, "you can infect millions of people in minutes," Ulevitch said.
Sign up for Computerworld eNewsletters.