The Syrian Electronic Army (SEA) has been causing chaos since 2011, targeting popular media outlets such as The New York Times, The Associated Press, The Washington Post, and NPR.

In the past few months they've demonstrated the ability to adjust their hacking tactics to maintain the element of surprise. However, there are signals in their recent activity that may provide insight to what hacking methods they'll use in the coming months.

With that in mind, security teams should assess their organization’s exposure to third-party website components and content distribution platforms.

This case study was created (September 2013) for security professionals who have interest in threat detection via Recorded Future's web intelligence platform.

Included in this case study:

  • Timeline of SEA attacks (July 2013 to August 2013)
  • Analysis of SEA method and target evolution
  • Details about our cyber intelligence application

Complete the form to instantly download your own copy.

Tell Your Network
Case Study Cover

Grab Your Copy Below

You can unsubscribe from our communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.