Daniel Goodman / Business Insider
It was able to do this by interfering with these sites' domain name systems (DNS), altering high-level details about how people access these web pages.
It began in Australia at a company called Melbourne IT, which handles the New York Times' Web hosting. The SEA used phishing tactics (which usually means tricking someone to type in a password and capturing it as it's typed) in order to break in.
Once inside, the
By severing the NYT's connection to DNS, the only way anyone could actually access the site was by typing in the IP address, and this is just not information people care to remember. Since everyone types out the DNS-enabled URL – newyorktimes.com – and because the hackers had total control of the DNS settings, they were able to reroute anyone attempting to access the site to a different web page of their own choosing.
In fact, some people who tried to access the Times' site yesterday were redirected to this image instead:
Screenshot
If this is the first time you've heard of the SEA, it isn't some brand-new organization. The group's been active since 2011 and hasn't been afraid to cause all kinds of big-time trouble since then. This is just the group's most recent display of its capabilities.