Syrian Electronic Army strikes Microsoft blog, Twitter accounts

  • Liam Tung (CSO Online)
  • — 13 January, 2014 11:44

The Syrian Electronic Army added to its Microsoft trophies over the weekend, hijacking two Microsoft Twitter accounts and defacing one of its blogs—and more attacks could be in store.

The hacker group, which has made a name for itself by hijacking high profile social media accounts and defacing news sites, has its sights on Microsoft, this time taking over its Twitter accounts @MSFTnews and @XboxSupport.

Over the weekend, the group posted several quickly-removed messages under Microsoft’s name, warning Microsoft’s followers: “Don’t use Microsoft emails (hotmail, outlook), They are monitoring your accounts and selling the data to the governments”.

It’s the second time in the past fortnight the group has targeted Microsoft’s social media accounts. The last was a hit on January 2 on Microsoft’s Skype, which lost control over its official blog, as well as its Twitter and Facebook accounts.

The SEA posted the same message on Skype’s hijacked profiles.

The SEA also managed to deface Microsoft’s TechNet Blogs pages and forced visitors across to its own site before Microsoft took the site down on Saturday for maintenance.

Microsoft’s blog pages were restored on Saturday and the company has reclaimed control over the affected accounts.

Microsoft also responded to the SEA’s claim it was “selling” email data to governments, telling Mashable that it only provides customer data in response to specific, targeted, legal demands from governments around the world — the type it began publishing details about last year.

Though Microsoft dealt with the nuisance swiftly, the company can expect to see more attacks, according to a comment from one SEA member “Syrian Eagle”.

"We can only say that's just the beginning," the SEA member told Mashable, adding that Microsoft’s data-sharing with intelligence and governments has affected the group.

Follow @CSO_Australia and sign up to the CSO Australia newsletter.

Tags: hack, Microsoft, twitter

Netcraft tool flags websites affected by Heartbleed

READ THIS ARTICLE
MORE IN Data Protection
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Webroot SecureAnywhere Business

The lightest, fastest, easiest-to-manage, and most effective endpoint protection.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.