TwitterFacebook

Chinese Hackers Attack the New York Times

Cyber war
Technology • Views: 21,880

Welcome to the new front: Chinese Hackers Infiltrate New York Times Computers.

SAN FRANCISCO — For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.

After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.

The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.

Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network. They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen’s relatives, and Jim Yardley, The Times’s South Asia bureau chief in India, who previously worked as bureau chief in Beijing.

“Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,” said Jill Abramson, executive editor of The Times.

The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China.

The attackers first installed malware — malicious software — that enabled them to gain entry to any computer on The Times’s network. The malware was identified by computer security experts as a specific strain associated with computer attacks originating in China. More evidence of the source, experts said, is that the attacks started from the same university computers used by the Chinese military to attack United States military contractors in the past.

^ back to top ^

TwitterFacebook

Turn off all ads for a full year by subscribing!
Take advantage of our yearly subscription, and save 50% off the normal subscription price! One-year ad-free subscriptions are just $59.95. Turn off all ads for a full year by subscribing now and save!
Read more...

► LGF Headlines

  • Loading...

► Tweeted Articles

  • Loading...

► Tweeted Pages

  • Loading...

► Top 10 Comments

  • Loading...

► Bottom Comments

  • Loading...

► Recent Comments

  • Loading...

► Tools/Info

► Tag Cloud

► Contact

You must have Javascript enabled to use the contact form.
Your email:

Subject:

Message:


Messages may be published unless you request otherwise.
Tech Note:
Using the Contact Form
LGF Pages

This button leads to the main index of LGF Pages, our user-submitted articles. You can post your own LGF Pages simply by registering a free account with us.

Create a Page

This is the LGF Pages posting bookmarklet. To use it, drag this button to your browser's bookmark bar, and title it 'LGF Pages' (or whatever you like). Then browse to a site you want to post, select some text on the page to use for a quote, click the bookmarklet, and the Pages posting window will appear with the title, text, and any embedded video or audio files already filled in, ready to go.

Or... you can just click this button to open the Pages posting window right away.

Last updated: 2015-03-17 11:42 am PDT

LGF User's Guide
Recent Pages
Fred72
Are conservatives anti-science?
Are conservatives anti-science? Spoiler: Conservatives aren't anti-science or pro-science. But, they are pro-common-sense. And once more scientists adopt common sense approach to science, they'll find that they have the support of conservative politicians - the people whose job it is ...

3 hours, 48 minutes ago
Views: 97 • Comments: 2
Tweets: 0 • Rating: 0
Thanos
Twitch-Targeting Botnets Use Infected PCs to Inflate Viewer Audiences
With video streaming site Twitch paying lucrative wages to celebrity gamers, it was inevitable--botnet-for-hire services that use hacked computers to fraudulently inflate viewership. According to a report published Friday by security firm Symantec, underground markets and, in some cases, ...

4 hours, 57 minutes ago
Views: 62 • Comments: 0
Tweets: 0 • Rating: 0
EiMitch
Cracked: 8 Things Vietnam War Movies Leave Out (By an Enemy Soldier)
cracked.com Once the fighting started, a lot of people died, well over a million on our side alone. For the war to continue, a constant stream of new fighters had to join up, and they didn't have the benefit of ...

1 day, 7 hours ago
Views: 397 • Comments: 4
Tweets: 0 • Rating: 5
Romantic Heretic
The Lavender Scare
Here is an interesting article on one of Tail Gunner Joe's sick witch hunts that has, unfortunately, been forgotten. I try not to feel schadenfreude of the fate of McCarthy's side kick, Ray Cohn, but I never succeed.

1 day, 14 hours ago
Views: 337 • Comments: 1
Tweets: 0 • Rating: 0
FemNaziBitch
Should Women ‘Man Up’ at the Office, or Does Office Culture Need to ‘Man Down’?
About the Graphic How should a woman try to get ahead in a male-dominated workplace? Perhaps the answer lies less on women "manning up" and more in how businesses value their employees. Many women confront this tension as they ...

2 days, 16 hours ago
Views: 376 • Comments: 1
Tweets: 0 • Rating: 1
William Barnett-Lewis
Orthopraxy Pt 2
If we accept the idea of Orthopraxy over Orthodoxy, then what does evangelism look like? What is the Witness of those who try to follow the Way of Christ Jesus? To evangelize is to spread the good news that we ...

3 days, 4 hours ago
Views: 399 • Comments: 0
Tweets: 0 • Rating: 4
thecommodore
Eric Alterman: A Wake-Up Call for US Liberals
A short column in The Nation that is a must read. The primary difference between liberalism and conservatism, at least in theory, is that the latter is an ideology and the former isn't. Conservatism, as Milton Friedman argued, posits that ...

3 days, 12 hours ago
Views: 615 • Comments: 0
Tweets: 1 • Rating: 5
Great White Snark
The NSA Has Taken Over the Internet Backbone. We’re Suing to Get It Back.
Blow off Snowden all you like, but what was revealed to be true is still true. The NSA lacks oversight with power. FISA is already too much and now they casually exceed even that generous provision. The world first learned ...

5 days, 11 hours ago
Views: 671 • Comments: 9
Tweets: 0 • Rating: 3
Lumberhead
Lead Prosecutor Apologizes, Admits Mistakes in Glenn Ford Case
This is a powerful admission of culpability and I applaud his courage in making it. It really should be read in its entirety. Glenn Ford should be completely compensated to every extent possible because of the flaws of a system ...

1 week, 1 day ago
Views: 824 • Comments: 4
Tweets: 0 • Rating: 8
Dark_Falcon
Sarah Vine of the DM gets it wrong on teaching about rape.
Sarah Vine of the DM gets it wrong: SARAH VINE: Teaching 11-year-olds about rape is a form of child abuse The problem with this country, I've come to realise, is that it treats adults like children and children like adults. ...

2 weeks, 2 days ago
Views: 1,237 • Comments: 6
Tweets: 0 • Rating: 9
 Frank says:

There are more love songs than anything else. If songs could make you do something we'd all love one another.