Twitter and Washington Post targeted by hackers

 

Social media giant Twitter is among the latest US companies to acknowledge that it is among a growing list of victims of Internet security attacks, saying that hackers may have gained access to information on 250,000 of its more than 200 million active users. And now, The Washington Post is joining the chorus, saying that it discovered that it was the target of a sophisticated cyberattack in 2011.

Twitter said a blog post on Friday it detected attempts to gain access to its user data earlier in the week. It shut down one attack moments after it was detected.

But Twitter discovered that the attackers may have stolen user names, email addresses and encrypted passwords belonging to 250,000 users they describe as 'a very small percentage of our users.“

Nonetheless, the company reset the pilfered passwords and sent emails advising the affected users.

The online attack comes on the heels of recent hacks into the computer systems of US media and technology companies, including The New York Times and The Wall Street Journal. Both American newspapers reported this week that their computer systems had been infiltrated by China-based hackers, likely to monitor media coverage the Chinese government deems important.

On Friday, The Washington Post disclosed in an article published on its website that it was the target of a sophisticated cyberattack, which was discovered in 2011. The company's spokeswoman, Kris Coratti, didn't offer any details including the duration of the attack or the origins. But according to sources that the paper quoted, who it said spoke on condition of anonymity, the intruders gained access as early as 2008 or 2009.

The cyberattack was first reported by an independent cybersecurity blog on Friday.

“Like other companies in the news recently, we face cybersecurity threats,” Coratti was quoted as saying. “We have a number of security measures in place to guard against cyberattacks on an ongoing basis.”

According to Coratti's comments made to the newspaper, the company worked with security company Mandiant to “detect, investigate and remediate the situation promptly at the end of 2011.”

Coratti couldn't be reached immediately for comment by The Associated Press.

China has been accused of mounting a widespread, aggressive cyber-spying campaign for several years, trying to steal classified information and corporate secrets and to intimidate critics. The Chinese foreign ministry could not be reached for comment, but the Chinese government has said those accusations are baseless and that China itself is a victim of cyber-attacks.

“Chinese law forbids hacking and any other actions that damage Internet security,” the Chinese Defense Ministry recently said. “The Chinese military has never supported any hacking activities.”

Twitter's director of information security, Bob Lord, said in the blog that the attack “was not the work of amateurs, and we do not believe it was an isolated incident.”

“The attackers were extremely sophisticated, and we believe other companies and organizations have also been recently similarly attacked,” Lord said. “For that reason we felt that it was important to publicise this attack while we still gather information, and we are helping government and federal law enforcement in their effort to find and prosecute these attackers to make the Internet safer for all users.”

One expert said that the Twitter hack probably happened after an employee's home or work computer was compromised through vulnerabilities in Java, a commonly used computing language whose weaknesses have been well publicized.

Ashkan Soltani, an independent privacy and security researcher, said such a move would give attackers “a toehold” in Twitter's internal network, potentially allowing them either to sniff out user information as it traveled across the company's system or break into specific areas, such as the authentication servers that process users' passwords.

The relatively small number of users affected suggested either that attackers weren't on the network long or that they were only able to compromise a subset of the company's servers, Soltani said.

Twitter is generally used to broadcast messages to the public, so the hacking might not immediately have yielded any important secrets. But the stolen credentials could be used to eavesdrop on private messages or track which Internet address a user is posting from.

That might be useful, for example, for an authoritarian regime trying to keep tabs on a journalist's movements.

“More realistically, someone could use that as an entry point into another service,” Soltani said, noting that since few people bother using different passwords for different services, a password stolen from Twitter might be just as handy for reading a journalist's emails.

Life and Style
ebookNow available in paperback
ebooks
ebookA delicious collection of 50 meaty main courses
Latest stories from i100
Have you tried new the Independent Digital Edition apps?
SPONSORED FEATURES
Independent Dating
and  

By clicking 'Search' you
are agreeing to our
Terms of Use.

ES Rentals

    iJobs Job Widget
    iJobs Gadgets & Tech

    Recruitment Genius: IT Support Engineer - 2nd & 3rd Line

    £25000 per annum: Recruitment Genius: The IT Support Engineer is needed to ass...

    Recruitment Genius: Junior / Mid Software Developer

    £22000 - £30000 per annum: Recruitment Genius: This is an exciting opportunity...

    Recruitment Genius: IT Service Desk Manager

    £35000 - £40000 per annum: Recruitment Genius: A great opportunity to join a p...

    Recruitment Genius: Graphic and Motion Designer

    Negotiable: Recruitment Genius: Do you get a buzz from thinking up new ideas a...

    Day In a Page

    The long walk west: they fled war in Syria, only to get held up in Hungary – now hundreds of refugees have set off on foot for Austria

    They fled war in Syria...

    ...only to get stuck and sidetracked in Hungary
    From The Prisoner to Mad Men, elaborate title sequences are one of the keys to a great TV series

    Title sequences: From The Prisoner to Mad Men

    Elaborate title sequences are one of the keys to a great TV series. But why does the art form have such a chequered history?
    Giorgio Armani Beauty's fabric-inspired foundations: Get back to basics this autumn

    Giorgio Armani Beauty's foundations

    Sumptuous fabrics meet luscious cosmetics for this elegant look
    From stowaways to Operation Stack: Life in a transcontinental lorry cab

    Life from the inside of a trucker's cab

    From stowaways to Operation Stack, it's a challenging time to be a trucker heading to and from the Continent
    Kelis interview: The songwriter and sauce-maker on cooking for Pharrell and crying over potatoes

    Kelis interview

    The singer and sauce-maker on cooking for Pharrell
    Refugee crisis: David Cameron lowered the flag for the dead king of Saudi Arabia - will he do the same honour for little Aylan Kurdi?

    Cameron lowered the flag for the dead king of Saudi Arabia...

    But will he do the same honour for little Aylan Kurdi, asks Robert Fisk
    Our leaders lack courage in this refugee crisis. We are shamed by our European neighbours

    Our leaders lack courage in this refugee crisis. We are shamed by our European neighbours

    Humanity must be at the heart of politics, says Jeremy Corbyn
    Joe Biden's 'tease tour': Could the US Vice-President be testing the water for a presidential run?

    Joe Biden's 'tease tour'

    Could the US Vice-President be testing the water for a presidential run?
    Britain's 24-hour culture: With the 'leisured society' a distant dream we're working longer and less regular hours than ever

    Britain's 24-hour culture

    With the 'leisured society' a distant dream we're working longer and less regular hours than ever
    Diplomacy board game: Treachery is the way to win - which makes it just like the real thing

    The addictive nature of Diplomacy

    Bullying, betrayal, aggression – it may be just a board game, but the family that plays Diplomacy may never look at each other in the same way again
    Lady Chatterley's Lover: Racy underwear for fans of DH Lawrence's equally racy tome

    Fashion: Ooh, Lady Chatterley!

    Take inspiration from DH Lawrence's racy tome with equally racy underwear
    8 best children's clocks

    Tick-tock: 8 best children's clocks

    Whether you’re teaching them to tell the time or putting the finishing touches to a nursery, there’s a ticker for that
    Charlie Austin: Queens Park Rangers striker says ‘If the move is not right, I’m not going’

    Charlie Austin: ‘If the move is not right, I’m not going’

    After hitting 18 goals in the Premier League last season, the QPR striker was the great non-deal of transfer deadline day. But he says he'd preferred another shot at promotion
    Isis profits from destruction of antiquities by selling relics to dealers - and then blowing up the buildings they come from to conceal the evidence of looting

    How Isis profits from destruction of antiquities

    Robert Fisk on the terrorist group's manipulation of the market to increase the price of artefacts
    Labour leadership: Andy Burnham urges Jeremy Corbyn voters to think again in last-minute plea

    'If we lose touch we’ll end up with two decades of the Tories'

    In an exclusive interview, Andy Burnham urges Jeremy Corbyn voters to think again in last-minute plea