WikiLeaks suffered a cyber-attack this morning from white hat collective OurMine, which posted a message on the site's homepage saying, "It's OurMine (security group). Don't worry we are just testing your... blablalblab oh wait, this is not a security test! WikiLeaks remember when you challenged us to hack you?
"Anonymous, remember when you tried to dox us with fake information for attacking wikileaks?
"There we go! One group beat you all! #WikileaksHack let's get it trending on twitter!"
The shop-window impact may have been embarrassing for WikiLeaks, but the attack itself was rudimentary, if highly effective in PR terms. According to a report on Hack News this morning, this was a simple DNS poisoning attack.
Anonymous responded to OurMine's goading by describing the attack as a "fake defacement", having previously shared personal information of claimed members of OurMine.
This latest attack by OurMine - which has leaked media companies' IP and last year compromised the social feeds of Facebook's Mark Zuckerberg and Google's Sundar Pichai, among others - reveals an uncomfortable truth about digital security in a networked, socially sensitive world.
Such apparent security "breaches" are often extremely low tech, but high value in news terms.
This makes them difficult to counter, except by ensuring that real domain security is absolute and that core services are protected, while trying to anticipate what attacks on the harder-to-police perimeter may have on customer services and public reputation.
Dr Kuan Hon criticises GDPR consent emails that will only eviscerate marketing databases and 'media misinformation'
Apple squashes Steam Link app on 'business conflicts' grounds
Philip Hammond wants to forget rules that the UK agreed with the EU to ban non-European companies from the satellites
Instapaper to 'go dark' in Europe until it can work out GDPR compliance