By Kim Smiley
On Tuesday, August 27, 2013 the New York Times website went dark for several hours after being attacked by a well-known group of hackers. Reports of hacked websites are becoming increasingly common and the New York Times was just one of many recent victims.
A Cause Map, or visual root cause analysis, can be used to analyze the recent attack on the New York Times website. A Cause Map lays out the many causes that contribute to an issue in an intuitive format that illustrates the cause-and-effect relationships. A Cause Map is useful for understanding all the causes involved and can help when brainstorming solutions. To see a Cause Map of this example, click on “Download PDF” above.
Some details of how the attack was done have been released, as documented on the Cause Map. The New York Times website itself was not technically hacked, but traffic was redirected away from the legitimate website to another web domain. To pull off this feat, hackers changed the domain name records for the New York Times website after acquiring the user name and password of an employee at the domain name registrar company. The employee inadvertently provided the information to the hackers by responding to a phishing email asking for personal information.
The email sent by the hackers looked legitimate enough to fool the employee.
So why did hackers target the New York Times in the first place? The answer is that the New York Times is one of many western media outlets to be targeted by Syrian Electronic Army (S.E.A.), who has claimed responsibility for the attack. The S.E.A. supports President Bashar al-Assad of Syria and is generally unhappy with the way the events in Syria have been portrayed in the West.
So the next logical question is how do you protect yourself from a phishing scheme? The first step is awareness. Pretty much everybody who uses email can expect to receive some suspicious emails. A few things to look out for: attachments, links, misspellings, and a mismatched “from” field or subject line. Also any alarming language should be a red flag. For example, an email from your credit card company warning you that your account will be closed unless you take immediate action is probably not the real deal. A good rule of thumb is to never respond to any email with personal information or to click on links in emails. If you think a request for action may be real, either call the company or open a new web browser window and type in the company’s web address. It’s best to delete any suspicious emails immediately.
This example is also a good reminder to be aware that websites can get hacked. A great example of this is when the S.E.A. hacked the Associated Press’s twitter feed last April and used it to announce (falsely) that the White House had been bombed. That one tweet is estimated to have caused a $136 billion loss in the stock markets as people responded to the news. In general, it is probably good to be skeptical about anything shocking you read online until the information is confirmed.