• Hours after the US airstrike on Iranian territory, Iranian-backed hackers took down US President Donald Trump’s social media platform.
  • Users were struggling to access Truth Social in the early morning following the alleged hack.
  • As the US continues to insert itself into the ongoing Iran-Israel conflict, the US government believes more cyberattacks could happen.
  • nutsack@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    39
    arrow-down
    1
    ·
    edit-2
    1 day ago

    they have to start differentiating a ddos attack from an actual breach. one is far more interesting than the other

    • ByteOnBikes@discuss.online
      link
      fedilink
      English
      arrow-up
      18
      ·
      20 hours ago

      I work in tech and I hate it when non-security people talk about it.

      It’s really painful to read about “a new hack that can affect billions of accounts” from a source, only to learn its some new social phishing method.

      • saruwatarikooji@lemmy.world
        link
        fedilink
        English
        arrow-up
        20
        arrow-down
        2
        ·
        2 days ago

        It’s been tried. A huge percentage of the internet runs on Amazon web services… And a massive ddos attack on that barely bumped it beyond the level of holiday shopping.

        To get anywhere on “taking down the internet” they’d probably have to physically take out many sites across the globe.

        • squaresinger@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          11 hours ago

          Sea cables are probably the most vulnerable point of the internet. There are comparatively few of them (on the order of a few hundreds), they are long, and most of their length is not guarded at all. The only reason I can think of, why nobody has targeted them at large is that it would also cut of the attacker.

        • abdominable@lemm.ee
          link
          fedilink
          English
          arrow-up
          6
          ·
          1 day ago

          You say this like the hour all major SAAS went down 2 weeks ago was nothing. MILLIONS lost in business hours is not nothing.

    • /home/pineapplelover@lemm.ee
      link
      fedilink
      English
      arrow-up
      45
      arrow-down
      1
      ·
      2 days ago

      I mean it does depend on the extent of the hack. But usually taking down the website, they don’t take the databases or anything

    • freeman@feddit.org
      link
      fedilink
      English
      arrow-up
      18
      arrow-down
      1
      ·
      edit-2
      2 days ago

      Hacking a Social Media profile --> Tearing down a poster

      Hacking a Website --> defacing a facade

      If the blinds arent closed by or a window is left open by accident, some information could get out. If the doors arent locked, the attacker could get access to further information.

      • IsoKiero@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        22
        ·
        edit-2
        2 days ago

        They didn’t hack anything. Just your plain old DDoS attack which took the service offline for a while, nothing was (at least based on what I read) actually hacked (or cracked as old-school folks like me would like it to be called) or stolen.

    • Sinthesis@lemmy.today
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      14 hours ago

      The word “hack” is pre-internet. A “hack” journalist or a “hack job” is basically something unprofessional. It is movies that turned “hackers” into someone that gained access to the “mainframe”. In the realm of computer systems, I would argue that a “hack” is doing anything the system was not intended/designed to do. A successful DoS or DDoS needs to find some component of the system that wasn’t designed to handle the amount of traffic about to be sent to it.

      There are protections for DDoS (iptables, fail2ban, Cloudflare and so on), you have to figure out a way around them, that’s a hack.

      • ours@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        10 hours ago

        The current tech-related usage was coined at MIT to mean working on a system. Funny that the oldest recorded source comes from MIT model railroad team.

      • ObjectivityIncarnate@lemmy.world
        link
        fedilink
        English
        arrow-up
        33
        arrow-down
        11
        ·
        2 days ago

        Mailing someone more letters than they’re capable of replying to is not equivalent to, nor a component of, gaining access to the inside of their home.

        • theherk@lemmy.world
          link
          fedilink
          English
          arrow-up
          36
          arrow-down
          1
          ·
          2 days ago

          Disabling network security and edge devices to change the properties of ingress can absolutely be a component of an attack plan.

          Just like overwhelming a postal sorting center could prevent a parcel containing updated documentation from reaching the receiver needing that information.

          • Kazumara@discuss.tchncs.de
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 day ago

            I haven’t heard of a firewall failing open when overwhelmed yet. Usually quite the opposite, a flood disables access to more than just the targeted device, when the state table overflows.

            But maybe there is a different mechanism I’m not aware of. How would the DDoS change the properties of ingress?

            • theherk@lemmy.world
              link
              fedilink
              English
              arrow-up
              4
              ·
              1 day ago

              By denying access to resources in a primary region, one might force traffic to an alternate infrastructure with a different configuration. Or maybe by overwhelming hosts that distribute BGP configurations. By denying access to resources, sometimes you can be routed to resources with different security postures or different monitoring and alerting, thus not raising alarms. But these are just contrived examples.

              Compromising devices is a wide field with many different tools and ideas, some of which are a bit off the wall and nearly all unexpected, necessarily.

        • pachrist@lemmy.world
          link
          fedilink
          English
          arrow-up
          12
          arrow-down
          1
          ·
          2 days ago

          I mean, I know JK Rowling sucks, and it’s been a long time since the first Harry Potter movie came out, but it was definitely a component and precursor to Hagrid beating the shit out of that door.

          • 🇰 🌀 🇱 🇦 🇳 🇦 🇰 🇮 @pawb.social
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            2
            ·
            edit-2
            2 days ago

            To be fair, they had moved to an unsecure location that was a much softer target by that point. Can a DDOS force someone to move their services over to the equivalent of a century old, weather-beaten lighthouse in the middle of England?

      • Kazumara@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        2
        ·
        1 day ago

        I’d start with the following, and refine if necessary:

        “Gaining unauthorized access to a protected computer resource by technical means.”

        • Port scanning --> Not hacking because there isn’t any access to resources gained*
        • Using default passwords that weren’t changed --> Not hacking because the resource wasn’t protected*
        • Sending spam --> Not hacking because there isn’t any access to resources gained
        • Beating the admin with a wrench until he tells you the key --> Not hacking because it’s not by technical means.
        • Accessing teacher SSN’s published on the state website in the HTML --> Not hacking because the resource wasn’t protected, and on the contrary was actively published**
        • Distributed denial of service attack --> Not hacking because there isn’t any access to resources gained

        * Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
        ** The governor and his idiot troupe eventually stopped their grandstanding and didn’t file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily

        • outhouseperilous@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          2
          ·
          20 hours ago

          When my parents kicked me out, the number of times o got to sleep inside because i could convince people i was the county password inspector was more than zero. It’s hacking.

          Wrench? No. But an old colleague informs me that the version done with a machete does count as hacking. I concur.

          Those are both way more useful than exploiting a lazy coder’s fuckup, renaming ‘house of many backdoors’ to ‘that package everyone uses in everything’ on github, or some fancy math shit.

          Your laws are nonsense bullshit, they’re just excuses for power and I’d appreciate you not defiling language fof the rest of us to justify them.

          • Kazumara@discuss.tchncs.de
            link
            fedilink
            English
            arrow-up
            1
            ·
            15 hours ago

            Those are both way more useful than exploiting a lazy coder’s fuckup

            I never said social engineering, physical breaching, exerting force on people, and other ways of compromising systems weren’t useful. They just aren’t hacking to me, otherwise the term is too broad to be very useful.

            You’re free to come up with your own definition, I was asked to define it and that’s my best shot for now.

            • MajorasMaskForever@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              15 hours ago

              I think a better definition would be “achieve something in an unintended or uncommon way”. Fits the bill on what generally passes in the tech community as a “hack” while also covering some normal life stuff.

              Getting a cheaper flight booked by using a IP address assigned to a different geographical location? Sure I’d call that a life hack. Getting a cheaper flight by booking a late night, early morning flight? No, those are deliberately cheaper

              Also re: your other comment about not making a reply at all, sometimes for people like us it’s just better to not get into internet fights over semantics (no matter how much fun they can be)

        • null_dot@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          21 hours ago

          Oh man.

          My comment was intended to imply that the term “hacking” defies definition because it has been grossly overused and misconstrued over many decades.

          Sure you might be able to convey what it means to you but of course it means different things to everyone else, with each definition being equally appropriate.

          Er go, any discussion is one of semantics.

          • Kazumara@discuss.tchncs.de
            link
            fedilink
            English
            arrow-up
            1
            ·
            15 hours ago

            You know my first instinct wast to reply with: “No.”

            Maybe I should have stuck with that. I had a feeling this would lead nowhere.

  • KazuyaDarklight@lemmy.world
    link
    fedilink
    English
    arrow-up
    216
    ·
    2 days ago

    Unclear from the article but, while a bit pedantic, this sounds more like it was potentially a DDoS attack rather than a proper “hack”.

    • Uninvited Guest@lemmy.ca
      link
      fedilink
      English
      arrow-up
      130
      arrow-down
      3
      ·
      edit-2
      2 days ago

      In an age where “willfully giving out your account password” is called hacking, here I’d call it tomato or tomato.

    • PaulBunyan@lemm.ee
      link
      fedilink
      English
      arrow-up
      24
      ·
      2 days ago

      313 Team is an Arabic-interest hacker collective, aligned with Iran, Palestine and Iraq, they reportedly used a distributed denial of service (DDoS) attack against Truth Social.

      The article seems pretty clear to me. Maybe it was updated?

    • Mearuu@kbin.melroy.org
      link
      fedilink
      arrow-up
      15
      arrow-down
      1
      ·
      2 days ago

      In order to launch a meaningful DDoS there must be thousands of compromised machines to use. I would absolutely say compromising such a large amount of machines is hacking.

      • wise_pancake@lemmy.ca
        link
        fedilink
        English
        arrow-up
        23
        ·
        2 days ago

        A lot of DDOS attacks nowadays are from a DDOS for hire service.

        So there could be hacking done, or just a bitcoin transfer.

        • FrederikNJS@lemmy.zip
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          2 days ago

          These DDOS for hire services make use of hacked machines as botnets to perform the DDOS attacks.

          So while the people paying for the service didn’t hack anything, the people performing the DDOS certainly did.

      • Darkard@lemmy.world
        link
        fedilink
        English
        arrow-up
        15
        ·
        2 days ago

        Or they just found a buffer overflow bug on their border router/firewall. I can’t imagine Truth Social has a keen network engineering team keeping up to patching and vulnerabilities.

        • jaybone@lemmy.zip
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 days ago

          Doesn’t Truth Social run a super old custom modded version of Lemmy? That thing must have a ton of vulnerabilities.

      • KazuyaDarklight@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        arrow-down
        1
        ·
        2 days ago

        It’s absolutely hacking those computer, just not the site. I just don’t want to get overly excited for something that doesn’t have much meat to it.

  • MrMakabar@slrpnk.net
    link
    fedilink
    English
    arrow-up
    68
    arrow-down
    1
    ·
    2 days ago

    Thankfully only DDos. Truth Social is Mastodon so a security flaw could have been a real problem.

    • Wispy2891@lemmy.world
      link
      fedilink
      English
      arrow-up
      42
      ·
      2 days ago

      nah it’s a lazy fork so seeing how he chooses people (they’re either cheap or friends of friends or both) “truth” can easily have a totally new security issue

      maybe the server has a root password that’s “trump454748$$$”

    • pressanykeynow@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 days ago

      Never saw security flaw now as a real problem. You just have to live with the fact that there is one. And you will suffer when it’s used. Security flaw later is a real problem.

  • blattrules@lemmy.world
    link
    fedilink
    English
    arrow-up
    97
    ·
    2 days ago

    Might be smart for Iran to just attack trump’s businesses as retribution for the bombings; if they attack the military, we’ll surely get pulled into another war, but just going after trump’s businesses will probably avoid a military response and maybe will make republicans come around to the fact that he should have divested himself from his businesses when he became president.

    • pivot_root@lemmy.world
      link
      fedilink
      English
      arrow-up
      52
      ·
      edit-2
      2 days ago

      going after trump’s businesses will probably avoid a military response

      More likely, it makes the poor baby (-hands) cry and throw a tantrum. Being the malignant narcissist he is, he thinks the resources of the United States government are entirely at his disposal. With that in mind, he’s absolutely going to demand a military response to any attacks on his businesses.

      Whether saner heads prevail, all we can do is hope.

      • blattrules@lemmy.world
        link
        fedilink
        English
        arrow-up
        23
        ·
        2 days ago

        Yeah agreed, he’s absolutely going to demand a military response to any attacks on his business, but maybe that’s enough to divide the republicans in congress and they’ll start to rein him in. Still going to take a lot for them to develop the balls to stand up to him, but might be good for us if Iran just goes after his businesses.

    • ramble81@lemmy.zip
      link
      fedilink
      English
      arrow-up
      33
      arrow-down
      1
      ·
      2 days ago

      His administration says damage to Teslas equates to terrorism. I don’t think it would go how you’re thinking.

    • Colonel Sharki@lemmy.world
      link
      fedilink
      English
      arrow-up
      24
      ·
      2 days ago

      With any other president I’d agree but this is Trump. A venal and petty man who wouldn’t think twice before using the country’s soldiers and even nuclear weapons to defend his sense of pride

    • Tehbaz@lemmy.wtf
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 days ago

      The bombings are an act of war, so Trump’s already dragged the US into a war with Iran at this point, despite the spin about being “at war with Iran’s nuclear programme but not Iran itself”

      I doubt Iran are that worried about the Americans starting a ground invasion either, it would be an absolute bloodbath and will have MAGA and non-MAGA everywhere calling for Trump’s head.

    • wjrii@lemmy.world
      link
      fedilink
      English
      arrow-up
      24
      ·
      edit-2
      2 days ago

      We have a president who issues fascistic edicts from the toilet and then phrases them like a Karen in her first term on her HOA or Condo board.

    • Ænima@feddit.online
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 days ago

      May just be the only thing that saves this country. Fewer people on social media is good for society at this point.