{"id":252,"date":"2007-05-25T02:11:35","date_gmt":"2007-05-25T06:11:35","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2007\/05\/25\/reading-about-the-superbowl-hack\/"},"modified":"2007-05-25T02:11:35","modified_gmt":"2007-05-25T06:11:35","slug":"reading-about-the-superbowl-hack","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2007\/05\/25\/reading-about-the-superbowl-hack\/","title":{"rendered":"Reading about the Superbowl Hack"},"content":{"rendered":"<p>I&#8217;m drafting some narrative about the last year of badware and one of the incidents that stand out to me is the Superbowl hack.  <\/p>\n<p><img decoding=\"async\" src=\"http:\/\/traffic.alexa.com\/graph?o=l&amp;c=1&amp;f=555555&amp;u=www.dolphinsstadium.com\/&amp;u=&amp;u=&amp;u=&amp;u=&amp;r=6m&amp;y=p&amp;z=1&amp;h=200&amp;w=450\" alt=\"Alexa Graph of Dolphins Website Traffic\" \/><\/p>\n<p>Below are some relevant links:<\/p>\n<p>    Websense advisory announcing the hack<br \/>\n    * <a href=\"http:\/\/www.websense.com\/securitylabs\/alerts\/alert.php?AlertID=733\">http:\/\/www.websense.com\/securitylabs\/alerts\/alert.php?AlertID=733<\/a><\/p>\n<p>    Related Microsoft vulnerabilities exploited by the attack<br \/>\n    * <a href=\"http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS06-014.mspx\">http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS06-014.mspx<\/a><br \/>\n    * <a href=\"http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS07-004.mspx\">http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS07-004.mspx<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m drafting some narrative about the last year of badware and one of the incidents that stand out to me is the Superbowl hack. Below are some relevant links: Websense advisory announcing the hack * http:\/\/www.websense.com\/securitylabs\/alerts\/alert.php?AlertID=733 Related Microsoft vulnerabilities exploited by the attack * http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS06-014.mspx * http:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS07-004.mspx<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[272],"tags":[],"class_list":["post-252","post","type-post","status-publish","format-standard","hentry","category-digital-warfare"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=252"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/252\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}