Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Data Security
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
Hacked by Chinese, NY Times Says; Are There Others?
Hacked by Chinese, NY Times Says; Are There Others?

By Jennifer LeClaire
January 31, 2013 2:45PM

Bookmark and Share
"The Chinese broke into The New York Times because of an article that was written," said security researcher Alex Horan. "Do we really believe The New York Times is the only U.S. target? That they are not breaking into large corporations with significant R&D budgets to access research?...It seems like a no-brainer."
 


Hackers have been infiltrating The New York Times' systems for the last four months, according to the newspaper, which said criminals had stolen passwords for its reporters and other employees. The Times is pointing a finger at China.

The Times reports that it has since rid its systems of attackers and put up defenses that prevent them from re-entering. This came in the wake of tracking the hackers' movements so they could determine how best to defend against the threat.

The attack is related to China, The Times believes, because of the timing. The attacks came as the paper published an investigative report about the relatives of China Prime Minister Wen Jiabao. Printed Oct. 25, the report detailed how his family had amassed a fortune worth several billion dollars.

Nothing Sensitive Lost

"Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times's network," Times reporter Nicole Perlroth wrote.

"They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen's relatives, and Jim Yardley, The Times's South Asia bureau chief in India, who previously worked as bureau chief in Beijing."

Jill Abramson, executive director of the paper, said computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied.

Who's Next?

Alex Horan of Core Security told us this is not a smash-and-grab on The New York Times -- this is someone breaking into your house and living in there for four months, watching everything you do without being seen.

"Think about it. For four months, there was a group of people whose full-time job was to maintain access to The New York Times internal network and review all their e-mails, appointments and other documents," Horan said.

Anyone who has worked in customer service knows every customer complaint represents a larger group of customers who felt the same way but didn't take the initiative to speak up about it, he continued.

"The Chinese broke into The New York Times because of an article that was written. Do we really believe The New York Times is the only U.S. target? That they are not breaking into large corporations with significant R&D budgets to access research?" Horan asked.

"Frankly, if you have a cheap hacking team to steal all the R&D from your competitors, it seems like a no-brainer....You can make the same product and sell it for less money because you don't have to pay for three years of research."
 

Tell Us What You Think
Comment:

Name:





 Data Security
1.   Tor Working To Fix Security Exploit
2.   Hackers Breached StubHub Accounts
3.   Juniper DDoS for High-IQ Networks
4.   Google Hacker Team to Hunt Bugs
5.   Cloud Firms Offer Azure Starter Kit


advertisement
Tor Working To Fix Security Exploit
Bug reportedly reveals ID of users
Average Rating:
Gartner Rates IT Security Companies
IBM, HP, McAfee, Splunk ranked well.
Average Rating:
Hackers Target Western Energy Firms
Appears to be state-sponsored group.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 

Enterprise Hardware Spotlight
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 

Mobile Technology Spotlight
Is the Amazon Fire Phone a Winner?
A late entry into a packed category of smartphones, Amazon's Fire phone offers a variety of unique features. Now, the reviewers are assessing if they're enough to make the phone stand out.
 
Review: Amazon Fire Offers New Ways To Use Phones
The Fire phone uses Android, but Amazon has modified it to the point that it's barely recognizable. That means the phone offers new ways to navigate, discover and, of course, shop.
 
Apple Patent for Smart Watch Comes to Light
Does a new smart watch patent issued to Apple provide a preview of the expected wearable from the tech giant? Some Apple-watchers are parsing the patent for signs of the coming product.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.