The take-down of the New York Times website for nearly two days last week exposed how easily computer hackers can exploit the Internet’s Achilles’ heel.
As the website was being restored Wednesday, the tech industry scurried to assess the high-profile cyberattack and weigh what measures could be taken to prevent a similar breach.
In the past two years, a growing number of companies with a significant presence on the Web have had to bolster their defenses to make up for security gaps that were not considered a problem when the Internet was created.
But as online attacks escalate in severity and visibility, high-profile targets whose digital presences often span the globe have struggled to spot and repair every vulnerability.
The latest cyberattack on the nation’s second-largest newspaper highlighted two well-known problems: a reliance on user names and passwords that can be easily stolen; and reliance on an unsecure directory that’s crucial to delivering the right content after a user enters a Web address in an Internet browser.
Hackers, in the New York Times case, got their hands on a user name and password that allowed them to edit the directory information for the newspaper’s Web address. As a result of the edits, readers who typed in “nytimes.com” were directed to the hacker group’s website before it was shut down. Readers saw an error message.
Though the newspaper re-edited the directory late Tuesday, several hours after the hack, readers continued to see error messages.
That’s because it took just as long for the fix to start restoring the site as the amount of time it was down.
The master copy of the directory with the newspaper’s information is held by a company based in Australia. Internet service providers such as Time Warner, Comcast and AT&T use temporary copies of the directories to make websites load faster, because accessing the master copies, typically in far-flung data centers, takes time. Their copies took hours to be updated with the fix.
Moore said the response by the technology community to resolve Tuesday’s issues offered a bit of relief.
Computer security analysts traced the take-down to domain name registrar Melbourne IT, an Australian company that keeps the master copy of New York Times’ entry in the Internet catalog. Historically, Melbourne IT and U.S.-based registrar MarkMonitor have been valued by large technology firms for top-notch security and reliability.
“These registrars have an impressive amount of power,” said Jaeson Schultz, a threat research engineer for Cisco Systems. “They are a central management point, and if you’re an attacker, that’s a juicy target.”
Someone affiliated with Melbourne IT was tricked by an email from a fraudster, the company said. Following instructions in the email, at least one person divulged a user name or password. Hackers used that information to access a Melbourne IT website that allowed them to redirect visitors trying to see newspaper articles.
Those visitors could have ended up on a website that exposed their computers to viruses, which is why experts suggest staying away from “hacked” websites.
“Everyone’s gut reaction is, ‘Let me see if it’s broken,’ or, ‘Let me see if it’s not working on my machine,’ ” said Todd Redfoot, chief information security officer for GoDaddy, a Melbourne IT competitor.
The Syrian Electronic Army hacking group claimed responsibility for the attack. The group said on Twitter that it had wanted to deliver an “anti-war message” to visitors of NYTimes.com and call attention to “lies” the newspaper had reported about the Syrian government.
With 30 million visitors a month, the newspaper’s website stood out as a potential global megaphone for the hackers.
They also tried to disrupt Twitter and other websites. But they didn’t succeed at that either because, unlike the New York Times, those websites had enabled a feature that required additional authorizations to make changes.
GoDaddy’s Redfoot said that the increasing exposure of cyberattacks is driving the development of more secure browsers, websites and Internet infrastructure. Yet challenges remain.
Redfoot advised Internet users to be just as aware of their surroundings online as when they are walking around outside.
The Charlotte Observer welcomes your comments on news of the day. The more voices engaged in conversation, the better for us all, but do keep it civil. Please refrain from profanity, obscenity, spam, name-calling or attacking others for their views.
Have a news tip? You can send it to a local news editor; email email@example.com to send us your tip - or - consider joining the Public Insight Network and become a source for The Charlotte Observer.Read moreRead less