WikiLeaks suffered a cyber-attack this morning from white hat collective OurMine, which posted a message on the site's homepage saying, "It's OurMine (security group). Don't worry we are just testing your... blablalblab oh wait, this is not a security test! WikiLeaks remember when you challenged us to hack you?
"Anonymous, remember when you tried to dox us with fake information for attacking wikileaks?
"There we go! One group beat you all! #WikileaksHack let's get it trending on twitter!"
The shop-window impact may have been embarrassing for WikiLeaks, but the attack itself was rudimentary, if highly effective in PR terms. According to a report on Hack News this morning, this was a simple DNS poisoning attack.
Anonymous responded to OurMine's goading by describing the attack as a "fake defacement", having previously shared personal information of claimed members of OurMine.
This latest attack by OurMine - which has leaked media companies' IP and last year compromised the social feeds of Facebook's Mark Zuckerberg and Google's Sundar Pichai, among others - reveals an uncomfortable truth about digital security in a networked, socially sensitive world.
Such apparent security "breaches" are often extremely low tech, but high value in news terms.
This makes them difficult to counter, except by ensuring that real domain security is absolute and that core services are protected, while trying to anticipate what attacks on the harder-to-police perimeter may have on customer services and public reputation.
A new RSA report urges coders to sign a 'Hippocratic Oath' before embarking on AI programmes.
IT security vendor believes APT33 is working for the Iranian government
Darktrace pushes machine learning to take some of the pressure off of IT and security teams
Google also gets its hands on HTC's IP in a non-exclusive deal