RSN Fundraising Banner
FB Share
Email This Page
add comment

Kaiman reports: "The hackers gained entry to the newspaper's internal systems and accessed the personal computers of 53 employees including David Barboza, its Shanghai bureau chief and author of the Wen expose, and Jim Yardley, a former Beijing bureau chief."

The New York Times claims they were targeted by Chinese hackers. (photo: Fox News)
The New York Times claims they were targeted by Chinese hackers. (photo: Fox News)

New York Times Claims Chinese Hackers Hijacked Its Systems

By Jonathan Kaiman, Guardian UK

31 January 13


ackers with possible ties to the Chinese military have repeatedly attacked the New York Times' computer systems over the past four months, possibly in retaliation for a series of stories that the paper ran exposing vast wealth accumulated by the family of outgoing premier Wen Jiabao, the newspaper has reported.

The hackers gained entry to the newspaper's internal systems and accessed the personal computers of 53 employees including David Barboza, its Shanghai bureau chief and author of the Wen exposé, and Jim Yardley, a former Beijing bureau chief.

An investigation by Mandiant, a cyber-security company hired by the New York Times, concluded that the hacks were likely part of an elaborate spy campaign with links to the country's military. The company traced the source of the attacks to university computers that the "Chinese military had used to attack United States Military contractors in the past", the Times said.

Although the hackers gained passwords for every Times employee, Mandiant found that they only sought information that was related to the Wen story.

The Times said it worked with telecommunications company AT&T and the FBI to trace the hackers after AT&T noticed suspicious activity on the paper's computer networks on 25 October, one day after the article appeared in print. A later analysis concluded that hackers initially broke into Times computers on 13 September when reporting for the Wen story was in its final pre-publishing stages.

The Times hired Mandiant on 7 November when management realised initial efforts to expel the hackers from the company's computer systems had been unsuccessful.

"To get rid of the hackers the Times blocked the compromised outside computers, removed every back door into its network, changed every employee password and wrapped additional security around its systems," said the article.

While Times executives worried that a flurry of hacker activity around the time of the US presidential elections may have indicated that the hackers were intent on shutting down the paper's publishing systems, "the attackers' movements suggested that the primary target remained Mr Barboza's email correspondence".

The Chinese government had warned the Times that the exposé would "have consequences", according to the report.

The hackers used a technique called spear-phishing, according to the article, allowing them to install malware on their targets' computers via seemingly innocuous email messages. The malware allowed them to add remote access tools that gave them access to data from employees' computers.

"Attackers no longer go after our firewall. They go after individuals. They send a malicious piece of code to your email account and you're opening it and letting them in," said Michael Higgins, the Times' chief security officer.

Chinese hackers began targeting western journalists in 2008 as part of a possible campaign to pre-empt stories that could damage the leadership's reputation at home and abroad, the article said. Bloomberg was also a victim of cyber-attacks after the newswire published a report on the vast wealth of incoming president Xi Jinping's family last summer.

In response to allegations that the Chinese military was behind the attacks, China's ministry of national defence told the New York Times that "Chinese laws prohibit any action including hacking that damages internet security" and that "to accuse the Chinese military of launching cyber-attacks without solid proof is unprofessional and baseless". your social media marketing partner


A note of caution regarding our comment sections:

For months a stream of media reports have warned of coordinated propaganda efforts targeting political websites based in the U.S., particularly in the run-up to the 2016 presidential election.

We too were alarmed at the patterns we were, and still are, seeing. It is clear that the provocateurs are far more savvy, disciplined, and purposeful than anything we have ever experienced before.

It is also clear that we still have elements of the same activity in our article discussion forums at this time.

We have hosted and encouraged reader expression since the turn of the century. The comments of our readers are the most vibrant, best-used interactive feature at Reader Supported News. Accordingly, we are strongly resistant to interrupting those services.

It is, however, important to note that in all likelihood hardened operatives are attempting to shape the dialog our community seeks to engage in.

Adapt and overcome.

Marc Ash
Founder, Reader Supported News

+2 # Kootenay Coyote 2013-01-31 13:44
As if the US Government wasn't the biggest hacker around, in volume, frequency & target categories....
0 # EPGAH3 2013-02-01 22:09
Sadly, we're not, our cyber-security is a joke at best. Hackers get jailed here, while China, Pakistan, even FRANCE, have SCHOOLS on how to do it RIGHT!
Then we wonder why so many cyber-attacks come from countries that are getting so much of our money! Maybe because we're here and unprotected, allegedly the two major criteria for hackers selecting targets?

THE NEW STREAMLINED RSN LOGIN PROCESS: Register once, then login and you are ready to comment. All you need is a Username and a Password of your choosing and you are free to comment whenever you like! Welcome to the Reader Supported News community.