Chinese Hackers Attack the New York Times

Cyber war

Welcome to the new front: Chinese Hackers Infiltrate New York Times Computers.

SAN FRANCISCO — For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.

After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.

The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.

Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network. They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen’s relatives, and Jim Yardley, The Times’s South Asia bureau chief in India, who previously worked as bureau chief in Beijing.

“Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,” said Jill Abramson, executive editor of The Times.

The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China.

The attackers first installed malware — malicious software — that enabled them to gain entry to any computer on The Times’s network. The malware was identified by computer security experts as a specific strain associated with computer attacks originating in China. More evidence of the source, experts said, is that the attacks started from the same university computers used by the Chinese military to attack United States military contractors in the past.

Jump to top

Create a PageThis is the LGF Pages posting bookmarklet. To use it, drag this button to your browser's bookmark bar, and title it 'LGF Pages' (or whatever you like). Then browse to a site you want to post, select some text on the page to use for a quote, click the bookmarklet, and the Pages posting window will appear with the title, text, and any embedded video or audio files already filled in, ready to go.
Or... you can just click this button to open the Pages posting window right away.
Last updated: 2016-01-01 10:29 am PST
LGF User's Guide RSS Feeds Tweet

Help support Little Green Footballs!

Subscribe now for ad-free access!Register and sign in to a free LGF account before subscribing, and your ad-free access will be automatically enabled.

Recent PagesClick to refresh
Coulter Cancels Berkeley Speech - Conservatives Whine About “Free Speech” Ann Coulter is one of the most vile and odious people on the political scene today, but this is ridiculous. As Elizabeth Warren said, "If you don't like her, don't show up," because the more campus leftist groups try ...
thecommodore
3 hours, 2 minutes ago
Views: 65 • Comments: 0 • Rating: 0
Tweets: 0 • Share to Facebook
Shares: 0
Comments: 0
: 0
Oregon Man Makes Record Ascent of Mount St. Helens With Snow Kite MOUNT ST. HELENS, Wash. – A Hood River man accomplished his 10-year mission to summit Mount St. Helens on a kite board, setting what he calls an unofficial record ascent of the iconic Pacific Northwest peak. vimeo.com On the ...
Bubblehead II
5 hours, 3 minutes ago
Views: 125 • Comments: 0 • Rating: 0
Tweets: 0 • Share to Facebook
Shares: 0
Comments: 0
: 0
ISIS Weapons Being Captured by Canadian Woman Working to Disarm Terrorists Much of the illegally traded weapons are small arms but some -- like the ISIS-made tunnel machine -- demonstrate a level of sophistication never seen before by such a group, according to Morrow. "It's quite unprecedented, the level at ...
Unshaken Defiance
5 hours, 36 minutes ago
Views: 106 • Comments: 0 • Rating: 0
Tweets: 2 • Share to Facebook
Shares: 0
Comments: 0
: 0
The Grifter’s Real Game? Psychology - Science Friday The grifter, the con artist, the flimflammer—the confidence man (or woman) goes by many names. But what the best of them have in common, according to The Confidence Game author Maria Konnikova, is an uncanny knack for understanding human ...
Birth Control Works
6 hours, 28 minutes ago
Views: 114 • Comments: 0 • Rating: 0
Tweets: 0 • Share to Facebook
Shares: 0
Comments: 0
: 0
Perception Scientist Says Reality Is ‘What Proved Useful in the Past’ Later in his explanation, he cites language as a clear example of something that’s part of our reality but only exists in our collective imagination. “It doesn’t exist without us,” he writes. “But it is very much part of ...
Birth Control Works
9 hours, 56 minutes ago
Views: 137 • Comments: 0 • Rating: 0
Tweets: 0 • Share to Facebook
Shares: 0
Comments: 0
: 0
STEALTHING: the Growing Movement of Men Who Secretly Remove Condoms During Sex Two years ago, a 19-year-old Florida teen posted a call for advice in the subreddit askgaybros. In the post, he said he met a guy on Grindr and went back to his place to hook up. When the guy ...
Birth Control Works
2 days, 20 hours ago
Views: 562 • Comments: 6 • Rating: 1
Tweets: 0 • Share to Facebook
Shares: 2
Comments: 0
: 0
Trump-Free Sunday Mornings-Daily Beast We think it’s time to go on a more balanced Donald Diet—call it a Sabbath for sanity. And that’s why we’re going to embark on a new experiment: Trump-free Sunday mornings. Barring major breaking news, for a few hours ...
Unshaken Defiance
3 days, 5 hours ago
Views: 244 • Comments: 0 • Rating: 0
Tweets: 1 • Share to Facebook
Shares: 3
Comments: 0
: 0
Video: John Muir - The Last Oasis John Muir - The Last Oasis is a short film directed by Michael Coleman a Martinez, California native inspired by the writings of naturalist, author and early advocate of wilderness preservation John Muir. Many of the locations featured in ...
teleskiguy
3 days, 16 hours ago
Views: 486 • Comments: 0 • Rating: 2
Tweets: 0 • Share to Facebook
Shares: 0
Comments: 0
: 0
The Woman Who Saved Lower Manhattan From Becoming a Highway What makes a city? It's not the buildings (skyscrapers) or the streets (traffic), or the banks and government offices and shopping districts sandwiched between them. It's the people. This is obvious nearly to the point of tautology, yet in ...
Birth Control Works
4 days ago
Views: 391 • Comments: 2 • Rating: 1
Tweets: 0 • Share to Facebook
Shares: 0
Comments: 0
: 0
Domestic Violence Shelters Make Plea for State Budget Resolution A group of domestic violence shelter representatives and other human services advocates gathered at Mutual Ground's headquarters in Aurora Wednesday morning to again make a plea for a resolution on the state's budget crisis and to call attention to ...
Birth Control Works
4 days, 2 hours ago
Views: 255 • Comments: 1 • Rating: 1
Tweets: 0 • Share to Facebook
Shares: 0
Comments: 0
: 0