Newsweek magazine’s Twitter account was hacked, displaying pro-ISIS messages.
CyberCaliphate is believed to have hacked Newsweek’s Twitter account on the morning of Tuesday, February 10, 2014, displaying pro-ISIS messages that resembled those shared on CENTCOM’s social media pages back in January.
What happened? The group — who claims to be affiliated with ISIS and has hacked both the Twitter account of the U.S. Central Command and Taylor Swift — sent out threatening tweets against First Lady Michelle Obama and others. During the breach, the @Newsweek account’s profile picture and banner were changed to images of a masked man and the Black Standard flag, along with a message “Je su IS IS.” In addition, Newsweek reveals that images of hackers claimed were confidential were also posted, specifically from the Defense Cyber Investigations Training Academy and the Pentagon.
When did it occur? At 10:45 a.m. on Tuesday, February 10, 2014, the Newsweek Twitter page was accessed by a group calling themselves the “Cyber Caliphate.” The account remained hacked for 14 minutes until 10:59 a.m., which was when Twitter’s support team regained control of the social channel at the magazine’s request.
What they’re saying: “We can confirm that Newsweek’s Twitter account was hacked this morning, and have since regained control of the account. We apologize to our readers for anything offensive that might have been sent from our account during that period, and are working to strengthen our newsroom security measures going forward,” Newsweek Managing Editor Kira Bindrim said in a statement.
Also on Tuesday, the websites of International Business Times, the Newsweek Tumblr account (nwkarchivist.tumblr.com) and the official account of Latin Times were also hacked. Newsweek, IB Times and Latin Times share a parent company, IBT Media. This joins the latest string of incidents for that day, including Forbes, Delta and the breaking news system of a Maryland television station WBOC, each of whom have also acknowledged recent cyber attacks.
These events come amid growing concerns that even the most trusted sites (and devices) can be used by hackers aimed at infiltrating sensitive industries. Thus, it is becoming increasingly clear that embedded system insecurity affects everyone and every company. With the number of breaches on the rise and no apparent end in sight, how can you ensure that your network is protected?