Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
Network Security
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Why Chinese Hackers Might Be Targeting U.S. Media
Why Chinese Hackers Might Be Targeting U.S. Media

By Jennifer LeClaire
February 3, 2013 8:36AM

Bookmark and Share
"The New York Times attack -- which apparently is tied to an investigation into the massive accumulation of wealth by one of China's most powerful officials, with the not-so-subtle suggestion that these were ill-gotten gains -- suggests a cause and effect coupled with an unprecedented level of cover-up," said analyst Rob Enderle. "If true, that would be ironic."
 


If the revelation that Chinese hackers infiltrated computer systems at The New York Times -- and stole passwords for employees -- was not disturbing enough, The Wall Street Journal followed up with troubling news of its own.

Indeed, The Journal reported that it also had been hacked. And the paper also pointed a finger at Chinese hackers trying to monitor the publication's China coverage.

The Journal reports that hackers broke into its network through computers in its Beijing bureau. A spokeswoman for Dow Jones & Co., the newspaper's publisher, said the Journal performed a network overhaul to beef up security Thursday.

"Chinese hackers for years have targeted major U.S. media companies with hacking that has penetrated inside newsgathering systems, several people familiar with the response to the cyberattacks said. Tapping reporters' computers could allow Beijing to identify sources on articles and information about pending stories," The Journal said. "Chinese authorities in the past have penalized Chinese nationals who have passed information to foreign reporters."

China Denies Attacks

The New York Times attack is related to China, The Times believes, because of the timing. The attacks came as the paper published an investigative report about the relatives of China Prime Minister Wen Jiabao. Printed Oct. 25, the report detailed how his family had amassed a fortune worth several billion dollars.

"It's part of this overall story that the Chinese want to know what the West thinks of them," Richard Bejtlich, chief security officer with the computer-security company Mandiant Corp., which was hired by The New York Times to investigate its breach, told The Journal. "What slant is the media going to take on them? Who are their sources?"

The Chinese government denies any involvement with the hacks. China's Defense Ministry issued a statement:

"Chinese law forbids hacking and any other actions that damage Internet security. The Chinese military has never supported any hacking activities. Cyberattacks are characterized by being cross-national and anonymous. To accuse the Chinese military of launching cyberattacks without firm evidence is not professional and also groundless."

'Would Be Ironic'

Alex Horan of Core Security told us on Thursday that he believed The New York Times was not the only U.S. target. He was right. For more analysis, we caught up with Rob Enderle, principal analyst at the Enderle Group. He told us increasingly there is a question of both how active the Chinese military's cyber spying efforts are and who actually controls them.

"The New York Times attack -- which apparently is tied to an investigation into the massive accumulation of wealth by one of China's most powerful officials, with the not-so-subtle suggestion that these were ill-gotten gains -- suggests a cause and effect coupled with an unprecedented level of cover-up," Enderle said.

"Now that could be partially because China doesn't want to appear like a country run by criminals but, if true, that would be ironic because getting caught creates the impression that this is exactly what has happened."
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Network Security
1.   Banks Hit by Android-Skirting Malware
2.   New Technology Defeats Privacy Efforts
3.   Juniper DDoS for High-IQ Networks
4.   Big DDoS Attacks Hit Record in 2014
5.   Can Google Stop Zero Day Flaws?


advertisement
Android SMS Worm on the Loose
Malware lets bad actors cash in.
Average Rating:
Banks Hit by Android-Skirting Malware
34 institutions, four European countries
Average Rating:
New Technology Defeats Privacy Efforts
Study identifies 3 browser techniques.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
34 European Banks Hit by Android-Skirting Malware
Criminals have been finding gaping holes in Android-based two-factor authentication systems that banks around the world are using. The result: 34 banks in four European countries have been hit.
 
New Web Tracking Technologies Defeat Privacy Protections
Recently developed Web tracking tools are able to circumvent even the best privacy defenses, according to a new study by researchers at Princeton and the University of Leuven in Belgium.
 
Juniper DDoS Solution Aims at High-IQ Networks
In the face of more complex attacks, Juniper Networks is boosting its DDoS Secure solution to help companies mitigate the threats with more effective security intelligence throughout the network fabric.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.