recommended reading

Pentagon Planned to Secure Web Domains Before Syrians Hijacked Marine Corps Site


The Pentagon was in the process of hiring help to bolster the security of military website domains, just as Syrian hackers allegedly assaulted the Marine Corps’ recruitment site on Labor Day.

The Syrian Electronic Army, a pro-regime hacktivist group, on Monday apparently redirected visitors to a webpage with a message urging service members not to strike Syria.

This domain name system hack and a similar one that brought down the New York Times website Aug. 27 are not new types of threats, according to security researchers. Nor is the Pentagon’s effort to strengthen the system that points visitors to valid military sites new. But concerns are growing amid high-profile DNS hijackings by the group and new FBI warnings about cyberattacks ahead of a possible military strike against Syria. 

"Potential risks to the Department of Defense DNS infrastructure such as hackers, phishing scams or distributed denial of service attacks meant to covertly extract data require [Defense] to develop plans to improve monitoring and management of the DoD DNS, and protect it from any external vulnerabilities," states an Aug. 22 notice to contractors issued by the Defense Information Systems Agency seeking engineering support to harden the domain name system.

The DNS essentially translates alphanumeric web addresses into network location codes.

Military officials want assistance to counter raids that flood networks with paralyzing traffic -- the denial of service episodes and incursions that corrupt databases.

DISA has reached out to contractors holding Secret clearances that might be interested in reinforcing the DNS for all combatant commands, services and military agencies. Companies have until Friday to inform agency officials of their qualifications for the potential contract.

In a statement on Monday, Marine Corps officials confirmed that visitors had been directed away from the authentic website and said the real one now functions properly, according to the Wall Street Journal. No data from the site was compromised, officials said.

The fake site displayed a letter signed by the “SEA” that read, in part, “Obama is a traitor who wants to put your lives in danger to rescue al- Qaida insurgents . . . Refuse your orders and concentrate on the real reason every soldier joins their military, to defend their homeland. You're more than welcome to fight alongside our army rather than against it.”

The New York Times incident reportedly occurred after the Syrian Electronic Army tricked a reseller of domain name services into divulging the password and username that allowed access to DNS records. Using the stolen credentials, the perpetrators corrupted the data that normally would direct people who type “” to the newspaper's web content. 

Earlier DNS attacks on organizations include a 2009 takeover of Twitter's domain, allegedly by the self-dubbed Iranian Cyber Army.

The prospective Pentagon DNS security provider would install commercially available technologies onto Defense's “existing and expanding” network grid, according to the solicitation. Military officials requested information on contractors' experience with DNSSEC, or Domain Name System Security Extension -- additional Web domain coding aimed at thwarting man-in-the-middle attacks that route visitors to fraudulent sites. 

Maryland-based Quotient has been providing DISA with DNS engineering support since 2010, according to the company's website and last month’s notice. 

(Image via jcjgphotography/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.