{"id":17343,"date":"2013-09-03T12:18:39","date_gmt":"2013-09-03T19:18:39","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=17343"},"modified":"2013-09-03T12:18:39","modified_gmt":"2013-09-03T19:18:39","slug":"syrian-electronic-army-attacks-military-recruitment-site","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/","title":{"rendered":"Syrian Electronic Army Attacks Military Recruitment Site"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-site.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-17347\" alt=\"SEA-defaces-Marine-site\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-site.jpg\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-site.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-site-150x99.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-site-300x199.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>For the last several months, the Syrian Electronic Army (SEA) has been causing quite a bit of a ruckus, <a href=\"http:\/\/www.washingtonpost.com\/business\/economy\/how-the-syrian-electronic-army-and-other-hacker-groups-are-attacking-news-web-sites\/2013\/08\/28\/bda8f464-1032-11e3-8cdd-bcdc09410972_story.html\" target=\"_blank\">defacing websites and commandeering Twitter accounts<\/a> of a number of media organizations and the occasional VoIP <a href=\"https:\/\/www.intego.com\/mac-security-blog\/viber-swallowed-phish-not-tracking-users\/\" target=\"_blank\">software company<\/a>. So far, they&#8217;ve been more of an annoyance than any sort of genuine threat. The SEA hacktivists generally get into organizations by phishing someone within a target company, which could either be a media organization or a software company, or even a resource provider such as a DNS registrar. Once they have the necessary access, the SEA have sent tweets or changed websites to spread their politically-themed message.<\/p>\n<p>It looks like the most recent chapter in their campaign is turning to American military sites, with an <a href=\"http:\/\/www.bloomberg.com\/news\/2013-09-02\/syrian-electronic-army-calls-marines-brothers-in-website-hack.html\" target=\"_blank\">attack on a recruitment site for the US Marine Corps<\/a>.\u00a0Thus far, these attacks have followed fairly predictable patterns, and it seems likely this may be just the first strike against the military&#8217;s social and PR web presence.<\/p>\n<p>There is no evidence so far that the SEA hacktivists have gone after the usual financial data that attackers usually seek, or anything else that would cause genuine damage. As a home user, at this point there is nothing you particularly need to fret about as a result of these breaches. But it does stress the importance of being wary of phishing attacks, as there may be more to lose than simply your login credentials. This is true especially at work; falling for phishing scams could mean the reputation of your company is also at stake. Attackers don&#8217;t need to hack the head IT guy or the executive staff to harm the reputation of a company; any entry point into a company could potentially give them a foot in the metaphorical door.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the last several months, the Syrian Electronic Army (SEA) has been causing quite a bit of a ruckus, defacing websites and commandeering Twitter accounts of a number of media organizations and the occasional VoIP software company. So far, they&#8217;ve been more of an annoyance than any sort of genuine threat. The SEA hacktivists generally [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":17349,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[609,551],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"For the last several months, the Syrian Electronic Army (SEA) has been causing quite a bit of a ruckus, defacing websites and commandeering Twitter\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Syrian Electronic Army Attacks Military Recruitment Site - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"For the last several months, the Syrian Electronic Army (SEA) has been causing quite a bit of a ruckus, defacing websites and commandeering Twitter\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-09-03T19:18:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-siteFT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"266\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-siteFT.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-siteFT.jpg\",\"width\":400,\"height\":266},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/\",\"name\":\"Syrian Electronic Army Attacks Military Recruitment Site - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#primaryimage\"},\"datePublished\":\"2013-09-03T19:18:39+00:00\",\"dateModified\":\"2013-09-03T19:18:39+00:00\",\"description\":\"For the last several months, the Syrian Electronic Army (SEA) has been causing quite a bit of a ruckus, defacing websites and commandeering Twitter\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Syrian Electronic Army Attacks Military Recruitment Site\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Syrian Electronic Army Attacks Military Recruitment Site\",\"datePublished\":\"2013-09-03T19:18:39+00:00\",\"dateModified\":\"2013-09-03T19:18:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#webpage\"},\"wordCount\":300,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-siteFT.jpg\",\"keywords\":[\"SEA\",\"Syrian Electronic Army\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"For the last several months, the Syrian Electronic Army (SEA) has been causing quite a bit of a ruckus, defacing websites and commandeering Twitter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/","og_locale":"en_US","og_type":"article","og_title":"Syrian Electronic Army Attacks Military Recruitment Site - The Mac Security Blog","og_description":"For the last several months, the Syrian Electronic Army (SEA) has been causing quite a bit of a ruckus, defacing websites and commandeering Twitter","og_url":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-09-03T19:18:39+00:00","og_image":[{"width":400,"height":266,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-siteFT.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-siteFT.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-siteFT.jpg","width":400,"height":266},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/","name":"Syrian Electronic Army Attacks Military Recruitment Site - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#primaryimage"},"datePublished":"2013-09-03T19:18:39+00:00","dateModified":"2013-09-03T19:18:39+00:00","description":"For the last several months, the Syrian Electronic Army (SEA) has been causing quite a bit of a ruckus, defacing websites and commandeering Twitter","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Syrian Electronic Army Attacks Military Recruitment Site"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Syrian Electronic Army Attacks Military Recruitment Site","datePublished":"2013-09-03T19:18:39+00:00","dateModified":"2013-09-03T19:18:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#webpage"},"wordCount":300,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-siteFT.jpg","keywords":["SEA","Syrian Electronic Army"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/syrian-electronic-army-attacks-military-recruitment-site\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/SEA-defaces-Marine-siteFT.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4vJ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/17343"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=17343"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/17343\/revisions"}],"predecessor-version":[{"id":20243,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/17343\/revisions\/20243"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/17349"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=17343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=17343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=17343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}