Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

New York Times accuses Chinese military of hacking its journalists

Major Trojan attack traced to Chinese universities

Article comments

Chinese hackers with connections to the country’s military have been accused of hacking into the computers of New York Times journalists as part of a wide-ranging campaign of espionage against US news media.

The accusation made by the New York Times itself, detected in flagrante delicto, is an extraordinary one, not least for the unusually clear suggestion that this was almost certainly the work of the Chinese authorities.

The newspaper said that the attackers had successful penetrated its network and gained access to the logins of 53 employees, including Shanghai bureau chief David Barboza who last October published an embarrassing article on the vast secret wealth of China’s prime minister, Wen Jiabao.

The newspaper was warned that this article would “have consequences,” prompting extra monitoring by AT&T for cyberattacks, it said.

After the telecom company noticed unusual activity which it was unable to trace or deflect, security firm Mandiant was brought into conduct a forensic investigation that uncovered the true extent of what had been going on.

Over four months starting in September 2012, the attackers had managed to install 45 pieces of targeted malware designed to probe for data such as emails after stealing credentials.

Although the staff logins were hashed but that doesn’t appear to have stopped the hackers in this instance, perhaps, the newspaper suggests, because they were able to deploy rainbow tables to beat the relatively short passwords.

Despite this, “computer security experts found no evidence that sensitive emails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,” said New York Times executive editor, Jill Abramson, in a prominent article in the paper.

Although the attackers tried to hide their origins – hiding behind compromised servers in a number of US universities – the newspapers and its hired security hands are now convinced that Chinese actors were behind the incursion which was monitored by Mandiant to establish its origins.

Apart from the design of the of the attacks and the unusual strain of malware used, the attacks were traced to Chinese university computers used in past attacks on US interests, and even to one hacking group given the moniker “APT Number 12.”

The company’s Symantec antivirus had only detected and quarantined one of the Trojans deployed, the newspaper reported Mandiant as having told them.

“Attackers no longer go after our firewall. They go after individuals. They send a malicious piece of code to your email account and you’re opening it and letting them in,” commented the paper’s chief security officer, Michael Higgins, referring to the simple email attack that probably initiated infection with the malware.

The Chinese have denied official involvement in the attacks, which are believed to be part of a large campaign to target US media.

Accusations of espionage by Chinese hackers against US interests are now routine. The first large US firm to break ranks and throw accusations was Google, which in 2010 accused the authorities of hacking Gmail accounts linked to political dissidents.


More from Techworld

More relevant IT news


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *