The Pentagon is working on beefing up their security some more lately. This is in reaction to Syrian hackers allegedly attacking the Marine Corps recruitment site on Labor Day. Unfortunately I missed that one because I don’t spend a lot of time browsing to the Marine Corps recruitment site. At least not since they laughed at my moobs. Apparently though if you did browse there on Monday the Syrian Electronic Army, a pro-regime hacktivist group, had hacked the site and was redirected visitors to a webpage with a message urging service members to not strike Syria.
If anything would make me want to strike Syria it wold be that. Attention Syrian hackers, “If you want pity, or safety, don’t screw with American’s ability to browse to any site we wish without popups and redirects. Nothing will make us want to bomb you back to the Stone Age more.”
This domain name system hack and a similar one that brought down the New York Times website Aug. 27 are not new types of threats, according to security researchers. Nor is the Pentagon’s effort to strengthen the system that points visitors to valid military sites new. But concerns are growing amid high-profile DNS hijackings by the group and new FBI warnings about cyberattacks ahead of a possible military strike against Syria.
“Potential risks to the Department of Defense DNS infrastructure such as hackers, phishing scams or distributed denial of service attacks meant to covertly extract data require [Defense] to develop plans to improve monitoring and management of the DoD DNS, and protect it from any external vulnerabilities,” states an Aug. 22 notice to contractors issued by the Defense Information Systems Agency seeking engineering support to harden the domain name system.
Hit the jump for the news clip.