TwitterFacebook

Chinese Hackers Attack the New York Times

Cyber war
Technology • Views: 21,813

Welcome to the new front: Chinese Hackers Infiltrate New York Times Computers.

SAN FRANCISCO — For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.

After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.

The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.

Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network. They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen’s relatives, and Jim Yardley, The Times’s South Asia bureau chief in India, who previously worked as bureau chief in Beijing.

“Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,” said Jill Abramson, executive editor of The Times.

The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China.

The attackers first installed malware — malicious software — that enabled them to gain entry to any computer on The Times’s network. The malware was identified by computer security experts as a specific strain associated with computer attacks originating in China. More evidence of the source, experts said, is that the attacks started from the same university computers used by the Chinese military to attack United States military contractors in the past.

^ back to top ^

TwitterFacebook

Turn off all ads for a full year by subscribing!
Take advantage of our end-of-the-year subscription special, and save 25% off the normal subscription price! For a limited time, one-year ad-free subscriptions are just $59.95. Turn off all ads for a full year by subscribing now and save!
Read more...

► LGF Headlines

  • Loading...

► Tweeted Articles

  • Loading...

► Tweeted Pages

  • Loading...

► Top 10 Comments

  • Loading...

► Bottom Comments

  • Loading...

► Recent Comments

  • Loading...

► Tools/Info

► Tag Cloud

► Contact

You must have Javascript enabled to use the contact form.
Your email:

Subject:

Message:


Messages may be published unless you request otherwise.
Tech Note:
Using the Contact Form
LGF Pages

This button leads to the main index of LGF Pages, our user-submitted articles. You can post your own LGF Pages simply by registering a free account with us.

Create a Page

This is the LGF Pages posting bookmarklet. To use it, drag this button to your browser's bookmark bar, and title it 'LGF Pages' (or whatever you like). Then browse to a site you want to post, select some text on the page to use for a quote, click the bookmarklet, and the Pages posting window will appear with the title, text, and any embedded video or audio files already filled in, ready to go.

Or... you can just click this button to open the Pages posting window right away.

Last updated: 2014-12-15 2:06 pm PST

LGF User's Guide
Recent Pages
Lumberhead
What Would Jesus Say/Do?
On the night that we celebrate the birth of Jesus, I thought it would be a good time to reflect on some of the things he said/did during his life among us - especially as it relates to things ...

23 hours, 49 minutes ago
Views: 172 • Comments: 2
Tweets: 0 • Rating: 0
Randall Gross
Nat King Cole - the Christmas Song -
Nat King Cole - The Christmas Song -

1 day, 2 hours ago
Views: 149 • Comments: 0
Tweets: 0 • Rating: 2
FemNaziBitch
Vatican Report Cites Achievements and Challenges of U.S. Nuns
"Sorry, folks. This is not a controversial document," Mother M. Clare Millea, an American nun who directed the investigation, said at the news conference. Instead, she said, it was "a challenge for all of us." If anything, the report ...

3 days, 10 hours ago
Views: 252 • Comments: 0
Tweets: 0 • Rating: 0
Rightwingconspirator
Blackmores Night-Christmas Music Olde And New At The Same Time
Spotify Youtube

1 week, 2 days ago
Views: 439 • Comments: 0
Tweets: 0 • Rating: 1
 Frank says:

There is no such thing as a dirty word. Nor is there a word so powerful, that it's going to send the listener to a lake of fire upon hearing it.