Medusa

Hackers in China Attacked The Times for Last 4 Months

<p>Chinese hackers have been persistently attacking The New York Times over the last 4 months&comma; infiltrating its computer systems and getting passwords for its reporters and other employees&period;<&sol;p>&NewLine;<p>The Times and Computer Security experts&comma; after surreptitiously tracking the intruders&comma; have erected better defenses to block them&period; They have expelled the attackers and kept them from further breaking-in&period;<&sol;p>&NewLine;<p><b><a href&equals;"http&colon;&sol;&sol;thediscoveryblog&period;com&sol;hackers-in-china-attacked-the-times-for-last-4-months&sol;file-photo-of-chinas-premier-wen-jiabao-standing-in-front-of-a-chinese-national-flag-at-the-great-hall-of-the-people-in-beijing&sol;" rel&equals;"attachment wp-att-221"><img class&equals;"aligncenter size-full wp-image-221" alt&equals;"Hackers in China Attacked The Times for Last 4 Months" src&equals;"https&colon;&sol;&sol;medusamagazine&period;com&sol;wp-content&sol;uploads&sol;2013&sol;03&sol;Hackers-in-China-Attacked-The-Times-for-Last-4-Months&period;jpg" width&equals;"600" height&equals;"338" &sol;><&sol;a>Origin of hacking<&sol;b><&sol;p>&NewLine;<p>The timing of the hacking coincided with the report published on 25<sup>th<&sol;sup> October about accumulation of wealth worth several billion dollars by the relatives of Wen Jiabao&comma; China’s Prime Minister&period;<&sol;p>&NewLine;<p><b>Evidence of hacking<&sol;b><&sol;p>&NewLine;<p>Mandiant&comma; Security experts hired by The Times gathered digital evidences breaching The Times Network&period; The hackers broke into the e-mail account of David Barboza&comma; the Shanghai Bureau Chief&comma; who wrote the reports about the accumulation of wealth and the e-mail account of Jim Yardley&comma; South Asia Bureau Chief located in India&period; The hackers seemed to have cloaked their operation by breaking through different routes – US Universities&period;<&sol;p>&NewLine;<p><b>Modus Operandi<&sol;b><&sol;p>&NewLine;<p>The attackers first installed malware &lpar;malicious software&rpar; which enabled access to any computer in The Times Network&period; This malware was identified by the computer security experts as a specific strain associated with computer attacks originating in China&period; They also found evidence that the hackers broke into the computers of 53 employees&period; However&comma; no customer data was stolen&period;<&sol;p>&NewLine;<p><b>China’s Response<&sol;b><&sol;p>&NewLine;<p>China’s Ministry of National Defense registered that Chinese Laws prohibit any acton including hacking that damages Internet Security&period; They added that it was unprofessional and baseless to accuse the launch of cyber attacks without solid proof&period;<&sol;p>&NewLine;<p><b>Precedent<&sol;b><&sol;p>&NewLine;<p>Last year&comma; the Bloomberg News Agency was targeted by the Chinese hackers for report on the wealth accumulated by Xi Jimping&comma; China’s Vice president at that time&period; A spokesman for Bloomberg that hackers had made attempts&comma; however&comma; without any data loss on the computers&period;<&sol;p>&NewLine;<p><b>Probable Motive<&sol;b><&sol;p>&NewLine;<p>It is assumed that the hackers began operations in 2008&period; These attacks suggest that the aim is far-reaching spying campaign at an expanding set of targets including corporations&comma; government agencies&comma; activist groups&comma; and media organizations in the United States&period; This is an effort trying to control China’s public image&comma; domestically and abroad&period; They aimed to intimidate their sources’ contacts and to anticipate stories that might damage the reputation of the Chinese leaders&period;<&sol;p>&NewLine;<p><b>Follow-up<&sol;b><&sol;p>&NewLine;<p>The Times notified and voluntarily briefed the Federal Bureau of Investigation on the attack&period;  Monitoring on the attackers continued&period; The hackers seemed to operate during the day time &lpar;in Beijing&rpar; and seemed to have intermittent breaks of 2 weeks&period; The passwords of all computers were changed and additional security was wrapped&period; This has ensured that no further &OpenCurlyQuote;break-in’s’ however&comma; constant alert and monitoring is persistently followed&period; Close watch and studies have commenced&comma; analyzing what holds and what may happen as the next steps&period; Thus&comma; cyber attacks have turned out to be truly international in perspective&comma; carrying mind-boggling intriguesas to the future&period;<&sol;p>&NewLine;

Exit mobile version