Chinese hackers 'attack New York Times computers'
Ian Burrell is Assistant Editor and Media Editor at The Independent, i paper and Independent on Sunday. He covers news from the whole media sector from television, press, radio and advertising to technology. His weekly column on the media appears every Monday in The Independent and i paper. He also writes on media, music and culture, including long-form pieces for The Independent’s Saturday magazine and the Independent on Sunday’s magazine, New Review. He is a regular presenter of BBC Radio 4’s What The Papers Say and a specialist commentator to Monocle 24 radio. He has contributed to most major broadcast outlets including BBC television and radio, CNN, Sky News, Al Jazeera and LBC. He has also written on media for GQ magazine. Ian has been reporting on the media industry for The Independent for more than a decade. Previously he was the newspaper’s Home Affairs Editor. He worked at The Sunday Times for five years, including as a member of the investigative Insight team, covering stories on political funding, industrial espionage and the arms industry. Previously he worked in ITV for London Weekend Television, on a weekly current affairs programme presented by Danny Baker. Ian trained at the Birmingham Post & Mail and was Regional Reporter of the Year in Press Gazette’s national awards.
Thursday 31 January 2013
The New York Times has claimed that it was victim of repeated attacks on its computer systems by Chinese hackers after it began an investigation into the business dealings of the Chinese Prime Minister Wen Jiabao.
The paper said the hacking attacks, which involved infiltrating its computers and obtaining the passwords of its reporters and other staff, coincided with its October investigation into Mr Wen having accumulated a fortune of several billion dollars through his business dealings.
The publisher brought in computer security experts which he said had uncovered hacking methods previously associated with the Chinese military. Among the individuals targeted was the New York Times Shanghai bureau chief David Barboza, who had written stories about Mr Wen’s relatives, and Jim Yardley, the paper’s former Beijing bureau chief, who had moved to a new post in India.
The paper claimed that its responses to the hacking had been successful. “After surreptitiously tracking the intruders to study their movements and help erect better defences to block them, the Times and computer experts have expelled the attackers and kept them from breaking back in,” it said in a report.
The hacking attack represents an early challenge for the former BBC Director General Mark Thompson, who took up his new role as chief executive and president of the New York Times in November.
Mandiant, a security firm hired by the publisher, found that the hackers had tried to disguise their origins by first targeting American university computers and directing their attacks on the newspaper from there. Chinese hackers had used a similar tactic of infiltrating university computers in previous attacks on the US military.
Malicious software (malware) was used to penetrate the New York Times system and gain access to the password of 53 employees. The paper said that it had found no evidence that the hackers had been attempting to access information other than that relating to its investigation into Mr Wen and it also claimed that sources on that project had not been compromised by the security breach.
Jim Abramson, executive editor of the New York Times, said: “Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied.”
The hackers are suspected of using a spear-phishing attack, in which targeted employees are sent emails containing a malicious link or attachment. By clicking on the e-mail, the employee immediately introduces a remote access tool (known as a RAT) onto their computer allowing every keystroke – and sometimes recording from the computer’s microphones and webcams - to be relayed to the attacker. Michael Higgins. Chief security officer at the New York Times, said: “Attackers no longer go after our firewall. They go after individuals. They send a malicious piece of code to your e-mail account and you’re opening it and letting them in.”
- 1 National Orgasm Day: Six reasons (plus one bogus one) why they're good for us
- 2 The 'world's most beautiful vagina' has been debunked by science
- 3 Whoopi Goldberg tells Cara Delevingne to suck it up: 'She's not famous. I'M famous'
- 4 John Green schools morning show hosts after awkward interview with Cara Delevingne
- 5 Doctor Who: Christopher Eccleston says why he left the BBC series after just one series
What turns someone into a conspiracy theorist? Study to look at why some are more 'receptive' to such theories
Stuart Baggs dies: Apprentice star 'The Brand' found dead aged 27
Whoopi Goldberg tells Cara Delevingne to suck it up: 'She's not famous. I'M famous'
John Green schools morning show hosts after awkward interview with Cara Delevingne
Supermodel Gisele Bundchen mocked for wearing a burka to avoid being seen visiting plastic surgeon in Paris
Yvette Cooper: Our choice is years of Tory rule under Jeremy Corbyn – or a return to a Labour government
Labour leadership contender Jeremy Corbyn says 'we can learn a great deal from Karl Marx'
Is Britain really full up? Are migrants taking our jobs? Leading academic answers the most common anti-immigration claims
Public anger after French sunbather beaten up by gang for wearing a bikini in Reims park
Labour leadership: New poll shows party is now even 'less electable' than under Ed Miliband
While we fixate on Calais, the Home Office is quietly deporting dozens of migrants on 'ghost flights'
£14000 - £17000 per annum: Recruitment Genius: The fastest growing travel comp...
£15500 - £17680 per annum: Recruitment Genius: A position has become available...
£60000 - £120000 per annum: Recruitment Genius: This conference call startup i...
£25000 - £30000 per annum: Recruitment Genius: This digital and print design a...