Chinese Hackers Attack the New York Times

Cyber war

Welcome to the new front: Chinese Hackers Infiltrate New York Times Computers.

SAN FRANCISCO — For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.

After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.

The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.

Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network. They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen’s relatives, and Jim Yardley, The Times’s South Asia bureau chief in India, who previously worked as bureau chief in Beijing.

“Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,” said Jill Abramson, executive editor of The Times.

The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China.

The attackers first installed malware — malicious software — that enabled them to gain entry to any computer on The Times’s network. The malware was identified by computer security experts as a specific strain associated with computer attacks originating in China. More evidence of the source, experts said, is that the attacks started from the same university computers used by the Chinese military to attack United States military contractors in the past.

Jump to top

Create a PageThis is the LGF Pages posting bookmarklet. To use it, drag this button to your browser's bookmark bar, and title it 'LGF Pages' (or whatever you like). Then browse to a site you want to post, select some text on the page to use for a quote, click the bookmarklet, and the Pages posting window will appear with the title, text, and any embedded video or audio files already filled in, ready to go.
Or... you can just click this button to open the Pages posting window right away.
Last updated: 2016-01-01 10:29 am PST
LGF User's Guide RSS Feeds

Help support Little Green Footballs!

Subscribe now for ad-free access!Register and sign in to a free LGF account before subscribing, and your ad-free access will be automatically enabled.

Recent PagesClick to refresh
Cass McCombs - ‘Run Sister Run’"Run Sister Run" by Cass McCombs from the album 'Mangy Love,' available 8/26Pre-order here: lnk.to Official Site: cassmccombs.comFacebook: facebook.comTwitter: twitter.com
Thanos
4 hours, 4 minutes ago
Views: 94 • Comments: 0 • Rating: 0
Tweets: 1 • Share to Facebook
Shares: 0
Likes: 0
Comments: 0
: 0
Is There Hope for the Honeybees? — Pacific Standard A new bill, the Pollinator Recovery Act, introduced last week by Senator Jeff Merkley (D-Oregon), seeks to further strengthen pollinators’ federal protection in Congress. Among other provisions, the bill would require the United States Department of Agriculture to conserve ...
Birth Control Works
4 hours, 33 minutes ago
Views: 117 • Comments: 0 • Rating: 1
Tweets: 3 • Share to Facebook
Shares: 0
Likes: 0
Comments: 0
: 0
The ‘Internet of Things’ Needs a Fix Lack of standards, lack of security, and application creep all create inertia against easy adoption. The first moments of ownership usually involve downloading an app, creating an account and connecting the thing to your Wi-Fi network. Sometimes that all ...
Thanos
5 hours, 44 minutes ago
Views: 120 • Comments: 0 • Rating: 1
Tweets: 1 • Share to Facebook
Shares: 0
Likes: 0
Comments: 0
: 0
North America Will Draw Half Its Electricity From Carbon-Free Sources by 2025 - Scientific American The United States, Mexico and Canada will make a joint pledge tomorrow to draw half the continent’s power from non-emitting sources by 2025. President Obama, President Enrique Peña Nieto of Mexico and Prime Minister Justin Trudeau of Canada will ...
Thanos
5 hours, 50 minutes ago
Views: 121 • Comments: 0 • Rating: 1
Tweets: 1 • Share to Facebook
Shares: 0
Likes: 0
Comments: 0
: 0
Egypt Deports Liliane Daoud, British-Lebanese Talkshow Host Ms Daoud, a former BBC journalist, was detained by plainclothes policemen at her home in Cairo on Monday and put on a plane to Beirut. The move came hours after her contract was terminated by privately-owned OnTV. Her show, ...
Thanos
5 hours, 51 minutes ago
Views: 135 • Comments: 0 • Rating: 1
Tweets: 1 • Share to Facebook
Shares: 0
Likes: 0
Comments: 0
: 0
Google Maps and Earth Just Got a Huge Boost The new techniques for processing the images will ensure that the pictures have more clarity and have a higher resolution. How did Google go about bringing clearer images users' way? Google deployed the publicly available Earth Engine API to ...
Thanos
10 hours, 24 minutes ago
Views: 243 • Comments: 0 • Rating: 2
Tweets: 26 • Share to Facebook
Shares: 1
Likes: 0
Comments: 0
: 1
NASA Studies Details of a Greening Arctic NASA scientists used almost 30 years of data from the NASA/U.S. Geological Survey Landsat satellites to track changes in vegetation in Alaska and Canada. Of the more than 4 million square miles, 30 percent had increases in vegetation (greening) ...
Thanos
21 hours, 53 minutes ago
Views: 236 • Comments: 0 • Rating: 0
Tweets: 12 • Share to Facebook
Shares: 3
Likes: 1
Comments: 0
: 4
Don’t Let Mississippi Establish Anti-Gay Religion The federal law and its many state imitators apply equally to all sincere religious believers and their beliefs. The Mississippi statute doesn't. It begins by singling out three religious beliefs or moral convictions for protection. They are that “marriage ...
Thanos
1 day, 7 hours ago
Views: 464 • Comments: 1 • Rating: 2
Tweets: 44 • Share to Facebook
Shares: 1
Likes: 1
Comments: 0
: 2
Brexit in Brussels: Juncker’s Mic Drop and Political Brexploitation The three presidents—Juncker along with Donald Tusk, who heads the European Council, and Martin Schulz, the president of the European Parliament—said they “expect the United Kingdom government to give effect to this decision of the British people as soon ...
Thanos
2 days, 8 hours ago
Views: 582 • Comments: 0 • Rating: 2
Tweets: 6 • Share to Facebook
Shares: 1
Likes: 0
Comments: 0
: 1
Brexit: EU Spells Out Procedure for UK to Leave The European Union has clarified the way the UK can kickstart formal negotiations to exit the bloc following Thursday's referendum. It says Britain can trigger Article 50, which sets a two-year deadline for a deal, by making a formal ...
Thanos
2 days, 10 hours ago
Views: 438 • Comments: 0 • Rating: 0
Tweets: 2 • Share to Facebook
Shares: 1
Likes: 0
Comments: 0
: 1