The New York Times blamed a prolonged website outage on Tuesday on a hacking attack at the company's Australia-based domain name registrar, Melbourne IT.
A story published by The Times on Tuesday afternoon quoted the company's CIO, Marc Frons, as saying the disruption was the result of an external attack on the registrar by the Syrian Electronic Army, or someone trying "very hard" to impersonate the hacking group.
The paper's main site was intermittently unavailable for several hours Tuesday afternoon and remained that way as of 7.00 p.m. ET.
In an initial Twitter post, The Times blamed the outage on "technical problems." But later, the newspaper's director of corporate communication indicated that the site might have been knocked offline by a hacking attack. The company said the attack required employees of The Times to stop sending sensitive emails for a period of time on Tuesday.
The same attack on Melbourne IT that caused problems for The Times may have compromised several other domains as well, including Twitter, security researchers said on Tuesday. The WHOIS records for Twitter on Tuesday afternoon showed that the Syrian Electronic Army compromised two of Twitter's domain names, they said.
In an alert, H.D. Moore, chief research officer at security vendor Rapid7, noted that Melbourne IT appears to be the registrar for several other larger companies, including Yahoo, Google, Microsoft, Ikea and AOL. "These other domains show no indication of being compromised, but if the attackers have found a weakness in the Melbourne IT system, these other domains may also be at risk," Moore wrote.
Chester Wisniewski, a senior security advisor at Sophos, said that the attackers likely gained access to the Australian registrar's systems and changed the domain name records of The Times so as to redirect traffic bound for the site to a server belonging to the Syrian Electronic Army.
A review of the DNS records for The Times when the site was unavailable on Tuesday afternoon shows the company's DNS records pointing to systems that appeared to be based in Moscow and in Syria, Wisniewski said.
"If we look at the history of these guys over the last six months they probably phished the name provider," he said.
Instead of directly attacking the intended target, the Syrian Electronic Army has shown a tendency to go after partners and service providers who might be less well protected, Wisniewski said.
He pointed to a recent website disruption at the Washington Post that appears to have resulted from an attack by the hacking group on content service provider Outbrain. In that incident, the hackers at the Syrian Electronic Army also appeared to try and use their access at Outbrain to compromise CNN, he noted.
Sign up for Computerworld eNewsletters.