NYTimes.com went sullen for the 2d time in a month on Tuesday afternoon , but that does n’t mean the newspaper will stop publishing . get around the DNS , The Timesis continuing to bring out storiesunder its bare IP destination . And the reportersare continue to compose .
Aside from being fast and chic , the Times ’s oeuvre around is comparatively simple . The cyberspace as we know itrelies on the Domain Name System ( DNS)to direct us to the placement of websites that are actually settle at a numeric IP address . NYTimes.com , for instance , simply points you to servers place at170.149.168.130 . So when hackers manage to pirate a domain — which is apparently what happened with this latest Times hack — the IP address and everything on the server that it points to stay intact . ( Pro Tip : If NYTimes.com is n’t exercise for you , you may justtype in the IP name and address and reach the entire site . )
https://gizmodo.com/why-your-internet-connection-just-had-a-freakout-and-h-1149838064

So what about that hack ? It appears that the Syrian Electronic Army got ahold of The New York Times ’s domain and rerouted it to one of its own sites . ( It alsolooks like Twitter.com got hit . ) A Times spokesperson read shortly after the outage that the trouble was “ likely result of malicious external attack . ” However , malice ca n’t scoop quick thinking .
https://gizmodo.com/syrian-electronic-army-claims-to-have-taken-over-twitte-1210239266
Update : As servicing remains intermittent , the Syrian Electronic Army allegation is starting to look more likely . Some usersreportedseeing this graphic when trying to claver The Times ’s website :

Meanwhile , the Timescontinues to put out articlesabout the furiousness and injustice in Syria .
Update 2 : The Times hasissued the next statement :
The New York Times entanglement site was unavailable to lector on Tuesday afternoon following an onslaught on the ship’s company ’s domain name registrar , Melbourne IT . The blast also involve employees of The Times to stop sending out sensitive eastward - mails .

Marc Frons , principal information military officer for The New York Times Company , issued a statement at 4:20 p.m. warning employees that the disruption — which appear to still be sham the Web site as of 5:50 p.m. — was ” the result of a malicious external attack by the Syrian Electronic Army “ or someone trying very intemperately to be them . ” He advised employees to “ be careful when post tocopherol - ring mail communications until this situation is decide . ”
Several masses on Twitter said they think it was the body of work of the Syrian Electronic Army , a grouping of hack who support President Bahar al - Assad of Syria . Matt Johansen , head of the Threat Research Center at White Hat Security , posted on Twitterthat he was manoeuvre to a Syrian Web orbit when he sample to enter the Times ’s WWW site .
Until now , The Times has been spared from being hacked by the Syrian Electronic Army , which has successfully disrupt the Web operation of news establishment like The Financial Times . On Aug. 15 , the group hacked The Washington Post ’s World Wide Web site through a third - political party service provided by a company call Outbrain . At the time , the Syrian Electronic Army also tried to hack CNN.Some selective information security expertssaid the group also appeared to be ready to hack The New York Times Web web site that day .

In a post on Twitter Tuesday afternoon , The Syrian Electronic Army also say it had hacked the administrative contact information for Twitter ’s domain name registry records . accord to the Whois.com lookup service , the Syrian Electronic Army was list on the entries for Twitter ’s administrative name , proficient name and due east - mail reference .
Hackers
Daily Newsletter
Get the best technical school , scientific discipline , and refinement news in your inbox day by day .
News from the future , delivered to your present tense .
You May Also Like










![]()
