Wikileaks 'hacked' by OurMine
The whistleblowing site was supposedly breached, but the attack was found to be a simple DNS spoof
Notorious whistleblowing site Wikileaks drew the attention of the cyber security community this week, as the organisation fell victim to an apparent hack.
Visitors to the Wikileaks homepage were greeted with a message from security company OurMine, proclaiming that it had hacked WikiLeaks in response to a challenge supposedly issued by the organisation.
"Hi, it's OurMine," the message read. "Don't worry we are just testing your... blablablab [sic], Oh wait, this is not a security test! Wikileaks, remember when you challenged us to hack you?"
The same statement also taunted cyber vigilante group Anonymous, indicating that this hack was partly in revenge for an incident in which Anonymous allegedly attempted to dox the group for attacking Wikileaks, which has been accused of being a front for Russian intelligence. "There we go" the message read. "One group beat you all!"
However, it quickly emerged that OurMine had not actually broken into Wikileaks' servers at all. Instead, the group used a tactic known as 'DNS poisoning', whereby an attacker gains control of the DNS server that controls how traffic is routed to an IP address, and redirects it to a location of their choosing, in this case, a page hosted on OurMine's own server.
The attack has now apparently been thwarted, and the Wikileaks site appears to be fully operational once again.
The statement left by the group echoed the message it commonly left on the social media accounts of its other victims, which usually state that the group is "just testing [the victim's] security". These victims include various high-profile companies and individuals, including Facebook founder Mark Zuckerberg, Google CEO Sundar Pichai and, most recently, Game Of Thrones creators HBO.
These hacks are apparently operated as promotional stunts for the group's cyber security consultancy and penetration testing business, with victims advised to contact the group if they wish to improve their security.
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now