TwitterFacebook

Chinese Hackers Attack the New York Times

Cyber war
Technology • Views: 21,973

Welcome to the new front: Chinese Hackers Infiltrate New York Times Computers.

SAN FRANCISCO — For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.

After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.

The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.

Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network. They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen’s relatives, and Jim Yardley, The Times’s South Asia bureau chief in India, who previously worked as bureau chief in Beijing.

“Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,” said Jill Abramson, executive editor of The Times.

The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China.

The attackers first installed malware — malicious software — that enabled them to gain entry to any computer on The Times’s network. The malware was identified by computer security experts as a specific strain associated with computer attacks originating in China. More evidence of the source, experts said, is that the attacks started from the same university computers used by the Chinese military to attack United States military contractors in the past.

Jump to top

Help support Little Green Footballs!

Subscribe now for ad-free access!

Contact Us LGF Pages

This button leads to the main index of LGF Pages, our user-submitted articles. You can post your own LGF Pages simply by registering a free account with us.

Create a Page

This is the LGF Pages posting bookmarklet. To use it, drag this button to your browser's bookmark bar, and title it 'LGF Pages' (or whatever you like). Then browse to a site you want to post, select some text on the page to use for a quote, click the bookmarklet, and the Pages posting window will appear with the title, text, and any embedded video or audio files already filled in, ready to go.

Or... you can just click this button to open the Pages posting window right away.

Last updated: 2015-06-25 5:21 pm PDT

LGF User's Guide RSS Feeds
Recent Pages
Skip Intro
Windows 10 is out. Help a guy out, please.
So I downloaded the Win 10 ISO image today, and started the install. The first thing I come across is a screen asking what I want to keep, my apps, data, and program settings, my data and program settings, or ...

10 hours, 45 minutes ago
Views: 200 • Comments: 4
Tweets: 0 • Rating: 0
FemNaziBitch
Donald Trump’s Lawyer Threatens Reporter Over Ex-Wife’s Allegations: ‘You Cannot Rape Your Spouse’
A lawyer and spokesman for current Republican presidential frontrunner Donald Trump issued a series of vulgar threats to a reporter on Monday, while falsely claiming that it was legal for a husband to rape his wife in New York. ...

13 hours, 47 minutes ago
Views: 161 • Comments: 0
Tweets: 1 • Rating: 0
Thanos
Mainline Presbyterian Members Win Lawsuit Over Control of Overland Park Church
The rest of this story is that the fundamentalist groups forming these schisms and trying to take whole churches are sometimes backed by legal groups and funding from foundations that trace back to the reclusive reconstructionist billionaire, Howard Ahmanson. In ...

1 day, 3 hours ago
Views: 270 • Comments: 0
Tweets: 0 • Rating: 1
Great White Snark
Huffington Post Arabic-Smart Outreach, Sure To Infuriate Bigots
Dirct Link: Huffington Post Arabic - Kudos! Good to see this. The link takes you right there, but for us non arabic readers, a helpful translate panel comes right up. You who do read arabic can judge the content, ...

2 days, 10 hours ago
Views: 609 • Comments: 0
Tweets: 18 • Rating: 1
Iwouldprefernotto
More Edited PP Videos
NYT -- More Edited PP Videos in the Pipeline The activist behind the videos, David Daleiden, has said he has enough covertly recorded footage for perhaps a dozen videos that he could release, one a week, for the next few ...

2 days, 13 hours ago
Views: 340 • Comments: 0
Tweets: 0 • Rating: 2
Predaka
Swedish Right Plans Gay Pride March Through Muslim Areas Of Stockholm
haaretz.com From the article: Swedish nationalists are planning a gay 'pride' march through Muslim-majority districts in the country's capital, according to media reports and a dedicated Facebook page. The march, called 'Pride Järva,' is scheduled to take place on July ...

3 days, 1 hour ago
Views: 627 • Comments: 10
Tweets: 0 • Rating: 1
EiMitch
Cracked: 5 Things I Learned Committing A Campus Sexual Assault
cracked.com This is a story of sexual assault told primarily from the perpetrator's perspective, using the pseudonyms "Tim" and "Vicky" for him and his victim respectively. But this isn't the story of a predator on the prowl. No, this is ...

5 days, 2 hours ago
Views: 582 • Comments: 2
Tweets: 4 • Rating: 3
Lumberhead
#BlackLivesMatter Shows There Are Problems in American Life That Can’t Be Blamed on the Rich
Democratic presidential candidates should take heed. They need to come up with a way to speak to this issue. Otherwise, in an Obama-less election, part of the Obama coalition may not be motivated to show up. Obviously, you can be ...

1 week ago
Views: 436 • Comments: 2
Tweets: 0 • Rating: 2
Drive By Commenter
Standing on the corner, screaming as the cars go by….
There is a long standing belief that there is no such thing as "Bad Ink..". You get ink and the name recognition, the story, the push and pull, the NEWS! So whatever Trump is, outside of his little world he ...

1 week ago
Views: 371 • Comments: 0
Tweets: 0 • Rating: 1
KiTA
Remember that time Gawker doxxed every gun owner in New York City?
"Here is a list of all the assholes who own guns in New York City." From the comments section: The journal posted my address and name for my gun ownership. My past stalker saw this. I haven't heard from him ...

1 week, 5 days ago
Views: 870 • Comments: 1
Tweets: 3 • Rating: 3

► LGF Headlines

  • Loading...

► Tweeted Articles

  • Loading...

► Tweeted Pages

  • Loading...

► Top 10 Comments

  • Loading...

► Bottom Comments

  • Loading...

► Recent Comments

  • Loading...

► Tools/Info

► Tag Cloud

 Frank says:

The gorilla is on an island,eats bananas and has a good time all day long. He plays out there in the bushes. Some Americans find out about the gorilla and they hear how BIG he is - you know.They're very impressed with the size of the beast. So they catch the gorilla & they stick him in a boat & bring him back to the US. They show him off to everybody & make a bunch of money. ...Then they kill him ! -- The song King Kong.1968 tour Wisconsin.