Hackers in China wage attacks on NY Times

For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.

For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.

The New York Times published an article in October about the wealth of the family of China’s prime minister, Wen Jiabao, in both English and Chinese.

After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.

Chef turned woman into ?200-a-night prostitute
World’s fastest bowler: Morne Morkel at a humongous 173.9 kmph at IPL 2013, but Hawk-Eye was not looking
Sunny Leone to be romanced by Ram Kapoor in ‘Patel Rap’
Sex drives Maria Sharapova, says addicted to having many lovers

The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct 25, that found that the relatives of Wen Jiabao, China?s prime minister, had accumulated a fortune worth several billion dollars through business dealings.

Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times?s network. They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen?s relatives, and Jim Yardley, The Times?s South Asia bureau chief in India, who previously worked as bureau chief in Beijing.

?Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,? said Jill Abramson, executive editor of The Times.

The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China.

The attackers first installed malware ? malicious software ? that enabled them to gain entry to any computer on The Times?s network. The malware was identified by computer security experts as a specific strain associated with computer attacks originating in China. More evidence of the source, experts said, is that the attacks started from the same university computers used by the Chinese military to attack United States military contractors in the past.

Security experts found evidence that the hackers stole the corporate passwords for every Times employee.

Get live Share Market updates, Stock Market Quotes, and the latest India News and business news on Financial Express. Download the Financial Express App for the latest finance news.

First published on: 01-02-2013 at 22:09 IST

Related News

Market Data
Market Data
Today’s Most Popular Stories ×