Featured Articles

TSMC: Volume production of 16nm FinFET in 2H 2015

TSMC: Volume production of 16nm FinFET in 2H 2015

TSMC has announced that it will begin volume production of 16nm FinFET products in the second half of 2015, in late…

More...
AMD misses earnings targets, announces layoffs

AMD misses earnings targets, announces layoffs

AMD has missed earnings targets and is planning a substantial job cuts. The company reported quarterly earnings yesterday and the street is…

More...
Did Google botch the Nexus 6 and Nexus 9?

Did Google botch the Nexus 6 and Nexus 9?

As expected, Google has finally released the eagerly awaited Nexus 6 phablet and its first 64-bit device, the Nexus 9 tablet.

More...
Gainward GTX 970 Phantom previewed

Gainward GTX 970 Phantom previewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
EVGA GTX 970 SC ACX 2.0 reviewed

EVGA GTX 970 SC ACX 2.0 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Tuesday, 07 August 2012 09:57

Reuters hacked

Written by Nick Farrell

hackers

Software out of date

News agency Reuters admitted that its blogging platform has been hacked twice. The latest attack came just 48 hours after a computer intruder was able to post fake news stories on its web site.

In Sunday's attack, a small Reuters Twitter feed - @ReutersTech, with 17,000 followers - was briefly controlled by hackers. The attacks appear to have come from Pro-Syran hackers who are desperate to tell a different story from the one which usually accuses them of massacring people.

But it seems that Reuters bought the attack on itself by not updating its CMS. Marcus Carey at vulnerability management and penetration testing company Rapid7 said that the attack was not particularly surprising, as it seems they were on version 3.1.1 of Wordpress, which could have been patched as early as July 2011. He said that Wordpress was  currently up to version 3.4.1 and it looks like there are twenty different vulnerabilities that have been reported for the older version that Reuters is using.  

Carey pointed out that Wordpress and its plug-ins are often targeted by attackers as the wide proliferation of the software makes it a target that provides a lot of bang for the buck for exploit developers. He said that it was plausible the attackers gained access through one of the known vulnerabilities associated with version 3.1.1 of Wordpress, and then reused the credentials they gained to hack Reuters’ Twitter account.

“We see so many breaches resulting from poor patching practices and organisations really need to take this seriously. Updating the software you use is a basic step in improving your security posture, yet too often we see evidence of a lack of execution in this area,” Carey said.


Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments