Need help? Chat now!
Search results for:
The Syrian Electronic Army (SEA), a well-known hacker group, announced on Wednesday, February 5th, that they had "_hacked the domain name registration information for social networking giant Facebook_" which had "_no effect_" on them or their members, according to an article published by independent tech news agency Re/code. The report indicates that the effect of the attack on the site's user base was "_nonexistent_" due to Facebook's implementation of "_registrar locks_" which exist to "_prevent changes to domain names from being carried out without manual checks with real live humans._"
The article states that the SEA claimed the hack by posting "_screen grab images of Facebook's domain registry information listing contact addresses in the Syrian capital city of Damascus_" on their Twitter feed. The group's attack was not aimed against "_Facebook itself_, "according to the article, but against MarkMonitor, "_the company responsible for maintaining its Internet domain registration._."
The report confirmed that the MarkMonitor's system displayed the changes that the group made. Still, these changes "didn't reflect in the database of Verisign, the main registrar for the .com top-level domain" – having "_no effect on where traffic to facebook.com was directed._" As the article outlines, MarkMonitor are specialists in protecting "_digital intellectual property_" which includes sheltering "_brands and trademarks_" from fraudulent and counterfeit online activity. According to information released in the report, the firm has handled domain name registrations for Facebook, Apple, and other organizations.
Read more about this "no-effect" hacking attack in the full Re/code article and how Facebook's actions avoided a more significant scale issue that could have touched their users – reflecting on the social media giant in a very negative way.
Written by Bryon Turcotte / February 6, 2014