Hackers abuse UK government wiki

Powered by SC Magazine
 

Swastika pasted onto Defra website.

The UK Department for Environment, Food and Rural Affairs was left with egg on its face when proposals published in an online wiki were 'edited' by a number of hackers. 

The Environment Contract was designed to make government policy more open, but hackers left some embarrassing editing throughout the site and a swastika was reportedly added to one page.

Environment Secretary David Miliband admitted that there were risks to the process before it started. 

"This is new territory for the government, and it involves a fair bit of trust," he said on his official blog.

"As anticipated, we have had some problems with accidental or malicious editing or removal of material. We may have to adjust our approach." 

The website was eventually taken down after 170 people made 'additions'.

The wiki was edited to include advice for citizens to "pay a higher proportion of their income to the government, and see little tangible improvement in their standard of living".

The tools needed to bring about this change were listed as "spade, organic yoghurt stirrer, old washing up liquid bottle, sticky-back plastic".

Following the attacks Miliband acknowledged that the "extreme openness" of the wiki had already lead to some practical jokes and the swastika.

"Strange how some people get their kicks. But the experiment will continue," he insisted.

Copyright ©v3.co.uk


Hackers abuse UK government wiki
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1023

Vote