{"id":4455,"date":"2013-09-19T12:46:02","date_gmt":"2013-09-19T19:46:02","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4455"},"modified":"2020-05-06T10:31:38","modified_gmt":"2020-05-06T17:31:38","slug":"what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/","title":{"rendered":"\u2018What-if\u2019 of the New York Times hack by the Syrian Electronic Army"},"content":{"rendered":"<p>In last week\u2019s blog post, I explained how Infoblox DNS Firewall works at the conceptual level. Here is an excellent example of its role in combatting the recent attack on the\u00a0<em>New York Times\u00a0<\/em>(NYT) and the \u2018what-if\u2019 this attack had been more sophisticated than what we saw. Within a few hours of this attack, Frank Hecker, Infoblox SE articulated the basic mechanics behind the attack that made its way in the customer newsletter.<\/p>\n<ul>\n<li>Normally the domain name\u00a0<a href=\"http:\/\/www.nytimes.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.nytimes.com<\/a>\u00a0maps to one or the other of the two IP addresses\u2014170.149.168.130 or 170.149.172.130\u2014the addresses for the\u00a0<em>New York Times<\/em>\u00a0web servers (or, to be accurate, the load balancers in front of the NYT web servers). This is how people going to the NYT web site get directed to the right servers.<\/li>\n<li>This mapping from\u00a0<a href=\"http:\/\/www.nytimes.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.nytimes.com<\/a>\u00a0to the correct IP addresses for the NYT web servers is maintained by the two NYT external DNS name servers,\u00a0<a href=\"http:\/\/dns.sea1.nytimes.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">dns.sea1.nytimes.com<\/a>\u00a0(at IP address 170.149.173.133), and\u00a0<a href=\"http:\/\/dns.ewr1.nytimes.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">dns.ewr1.nytimes.com<\/a>\u00a0(at IP address\u00a0170.149.168.134). Anybody going to a *.<a href=\"http:\/\/nytimes.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">nytimes.com<\/a>\u00a0domain is directed to those name servers in order to find the right IP addresses for the corresponding NYT servers.<\/li>\n<li>The Syrian Electronic Army (SEA) did NOT directly hack the NYT web servers. They also did NOT directly hack the NYT DNS name servers. What they did instead was to go up a level and attack the DNS registrar (IT Melbourne) at which the\u00a0<em>New York Times<\/em>\u00a0had registered the\u00a0<a href=\"http:\/\/nytimes.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">nytimes.com<\/a>\u00a0domain name. They hacked into an account at IT Melbourne (one that had fairly high privileges), and changed the IP addresses for the\u00a0<a href=\"http:\/\/nytimes.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">nytimes.com<\/a>\u00a0DNS name servers to the IP addresses of DNS name servers that the SEA controlled. Those malicious name servers then gave out IP addresses for\u00a0<a href=\"http:\/\/www.nytimes.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.nytimes.com<\/a>\u00a0that were for SEA-controlled systems.<\/li>\n<li>As a result, anyone attempting to browse to the New York Times web site was instead redirected to an SEA web server.<\/li>\n<\/ul>\n<p>The hacked site had a banner indicating that the site was hacked. However\u2026suppose an employee were in the regular habit of going to the\u00a0<em>New York Times<\/em>\u00a0web site to read the news. And suppose that the Syrian Electronic Army had that page configured to exploit a browser security vulnerability, and then used that to load advanced persistent threat (APT) malware onto the employee&#8217;s PC, that would impact hundreds or thousands of enterprise or government employees or military personnel all going to the NYT site.<\/p>\n<p><strong>How does DNS Firewall protect customers?<\/strong><\/p>\n<p>Obviously most IT security personnel want to prevent this from happening and that&#8217;s where Infoblox DNS Firewall comes in:<\/p>\n<ul>\n<li>Shortly after the attack occurred, the Infoblox DNS Firewall RPZ feed was updated to blacklist the SEA name server IP addresses.<\/li>\n<li>If our customer tried to surf to the\u00a0<em>New York Times<\/em>\u00a0web site, Infoblox DNS Firewall would get a response back directing it to the name servers controlled by the SEA. However, because the SEA name server IP addresses were blacklisted, the DNS firewall would block the query.<\/li>\n<li>As an alternative, the Infoblox DNS Firewall could have been configured to return a different IP address to redirect to the web page provided by IT security. For example, this site could have a warning page to tell users they were trying to surf to a malicious site.<\/li>\n<li>Note that since the Infoblox DNS Firewall RPZ feed blacklisted the SEA name servers, end users would also be protected against going to any other sites (such as some of the Twitter sites) hacked by the SEA: As long as those other domains have the SEA systems as name servers, they would be treated as malicious.<\/li>\n<li>This fix was made automatically via the feed as opposed to requiring manual updates to a traditional DNS blacklist.<\/li>\n<li>In the event that a customer PC had gotten infected during the brief window of vulnerability before the Infoblox DNS Firewall RPZ feed got updated, the DNS Firewall would still provide protection, since malware infecting the PC would then be unable to communicate out to its command-and-control network, as they would be blacklisted as well.<\/li>\n<li>Finally, if the Infoblox appliance were directly handling the DNS query (as opposed to having queries forwarded to it from Microsoft DNS servers), then IT security would have the true source IP address of the PC or other device accessing the malicious site. And if an Infoblox appliance were also handling DHCP (as opposed to having that done by Microsoft DHCP servers), then IT security could also easily look up the MAC address for the device and its device type (using DHCP fingerprinting) to identify the exact device at issue. If in addition the agency had an Infoblox Reporting server, then this information would be easily accessible through the reporting GUI, as opposed to looking through logs and different screens.<\/li>\n<\/ul>\n<p>To summarize, even if Infoblox DNS Firewall would not prevent hacking attacks like that, which affected the\u00a0<em>New York Times<\/em>; it can protect enterprises, government agencies, and others from the possible downstream effects of those attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In last week\u2019s blog post, I explained how Infoblox DNS Firewall works at the conceptual level. Here is an excellent example of its role in combatting the recent attack on the\u00a0New York Times\u00a0(NYT) and the \u2018what-if\u2019 this attack had been more sophisticated than what we saw. Within a few hours of this attack, Frank Hecker, [&hellip;]<\/p>\n","protected":false},"author":254,"featured_media":1940,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,44,201,200,16,15],"class_list":{"0":"post-4455","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-dns-firewall","10":"tag-firewall","11":"tag-hack","12":"tag-infoblox","13":"tag-security","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u2018What-if\u2019 of the New York Times hack by the Syrian Electronic Army<\/title>\n<meta name=\"description\" content=\"Here is an excellent example of its role in combatting the recent attack on the\u00a0New York Times\u00a0(NYT) and the \u2018what-if\u2019 this attack had been more sophisticated than what we saw.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018What-if\u2019 of the New York Times hack by the Syrian Electronic Army\" \/>\n<meta property=\"og:description\" content=\"Here is an excellent example of its role in combatting the recent attack on the\u00a0New York Times\u00a0(NYT) and the \u2018what-if\u2019 this attack had been more sophisticated than what we saw.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-09-19T19:46:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Renuka Nadkarni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Renuka Nadkarni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\\\/\"},\"author\":{\"name\":\"Renuka Nadkarni\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/111901fc66473b7a5d5d6cf2ae869ef9\"},\"headline\":\"\u2018What-if\u2019 of the New York Times hack by the Syrian Electronic Army\",\"datePublished\":\"2013-09-19T19:46:02+00:00\",\"dateModified\":\"2020-05-06T17:31:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\\\/\"},\"wordCount\":860,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-2.jpg\",\"keywords\":[\"DNS\",\"DNS Firewall\",\"Firewall\",\"Hack\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\\\/\",\"name\":\"\u2018What-if\u2019 of the New York Times hack by the Syrian Electronic Army\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-2.jpg\",\"datePublished\":\"2013-09-19T19:46:02+00:00\",\"dateModified\":\"2020-05-06T17:31:38+00:00\",\"description\":\"Here is an excellent example of its role in combatting the recent attack on the\u00a0New York Times\u00a0(NYT) and the \u2018what-if\u2019 this attack had been more sophisticated than what we saw.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"DNS Based DDoS Attacks - What's In a Name?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u2018What-if\u2019 of the New York Times hack by the Syrian Electronic Army\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/111901fc66473b7a5d5d6cf2ae869ef9\",\"name\":\"Renuka Nadkarni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"caption\":\"Renuka Nadkarni\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/renuka-nadkarni\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u2018What-if\u2019 of the New York Times hack by the Syrian Electronic Army","description":"Here is an excellent example of its role in combatting the recent attack on the\u00a0New York Times\u00a0(NYT) and the \u2018what-if\u2019 this attack had been more sophisticated than what we saw.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/","og_locale":"en_US","og_type":"article","og_title":"\u2018What-if\u2019 of the New York Times hack by the Syrian Electronic Army","og_description":"Here is an excellent example of its role in combatting the recent attack on the\u00a0New York Times\u00a0(NYT) and the \u2018what-if\u2019 this attack had been more sophisticated than what we saw.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/","og_site_name":"Infoblox Blog","article_published_time":"2013-09-19T19:46:02+00:00","article_modified_time":"2020-05-06T17:31:38+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2.jpg","type":"image\/jpeg"}],"author":"Renuka Nadkarni","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Renuka Nadkarni","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/"},"author":{"name":"Renuka Nadkarni","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/111901fc66473b7a5d5d6cf2ae869ef9"},"headline":"\u2018What-if\u2019 of the New York Times hack by the Syrian Electronic Army","datePublished":"2013-09-19T19:46:02+00:00","dateModified":"2020-05-06T17:31:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/"},"wordCount":860,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2.jpg","keywords":["DNS","DNS Firewall","Firewall","Hack","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/","url":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/","name":"\u2018What-if\u2019 of the New York Times hack by the Syrian Electronic Army","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2.jpg","datePublished":"2013-09-19T19:46:02+00:00","dateModified":"2020-05-06T17:31:38+00:00","description":"Here is an excellent example of its role in combatting the recent attack on the\u00a0New York Times\u00a0(NYT) and the \u2018what-if\u2019 this attack had been more sophisticated than what we saw.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20-2.jpg","width":660,"height":454,"caption":"DNS Based DDoS Attacks - What's In a Name?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-if-of-the-new-york-times-hack-by-the-syrian-electronic-army\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"\u2018What-if\u2019 of the New York Times hack by the Syrian Electronic Army"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/111901fc66473b7a5d5d6cf2ae869ef9","name":"Renuka Nadkarni","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","caption":"Renuka Nadkarni"},"url":"https:\/\/www.infoblox.com\/blog\/author\/renuka-nadkarni\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/254"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4455"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4455\/revisions"}],"predecessor-version":[{"id":4456,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4455\/revisions\/4456"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1940"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}