Microsoft the latest to be hit by hackers

Feb 23, 2013
The Microsoft logo seen on a tablet screen on December 4, 2012 in Paris. Microsoft joined Facebook and Apple on the list of US technology titans targeted in recent cyberattacks.

Microsoft joined Facebook and Apple on the list of US technology titans targeted in recent cyberattacks.

"As reported by and Apple, Microsoft can confirm that we also recently experienced a similar security intrusion," Trustworthy Computing team general manager Matt Thomlinson said in a blog post.

"During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations."

There was no evidence customer data was stolen but an investigation into the attack was continuing, according to Thomlinson.

"This type of is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries," he said.

Apple said Tuesday that hackers invaded its system in an attack similar to one recently carried out against Facebook, but that it repelled the intruders before its data was plundered.

The maker of iPhones, , iPods and said it was working with to hunt down the hackers, who appeared tied to a series of recent cybe attacks on US technology firms.

"The malware was employed in an attack against Apple and other companies, and was spread through a website for software developers," Apple told AFP.

The malicious software, or malware, took advantage of a vulnerability in a Java program used as a "plug-in" for Web-browsing programs.

A "small number" of computer systems at Apple were infected but they were isolated from the main network, according the Silicon Valley-based company.

"There is no evidence that any data left Apple," Apple said.

Word of hackers hitting Apple came just days after leading social network Facebook said it was "targeted in a " last month, but that no user data was compromised.

Facebook said malware that infected some of its machines came from a mobile developer website that had been booby-trapped.

Early this month, Twitter said it was hammered by a cyberattack similar to those that recently hit major Western news outlets, and that the passwords of about 250,000 users were stolen.

While those behind the attacks had yet to be identified, computer security industry specialists have expressed suspicions about China-sponsored hackers and Eastern European crime gangs.

Explore further: Digital dilemma: How will US respond to Sony hack?

add to favorites email to friend print save as pdf

Related Stories

Hackers hit Apple in wake of Facebook attack

Feb 19, 2013

Apple on Tuesday said it suffered a cyber attack similar to the one recently carried out against Facebook, but that it repelled the invaders before its data was plundered.

Apple out to kill widespread Macintosh virus

Apr 11, 2012

Apple said it is crafting a weapon to vanquish a Flashback virus from Macintosh computers and working to disrupt the command network being used by hackers behind the infections. ...

Hackers pick Google's pocket with Mac virus

May 01, 2012

A virus infecting Macintosh computers is picking Google's pocket by hijacking advertising "clicks," tallying as much as $10,000 daily, according to Internet security firm Symantec.

Apple girding gadgets against hackers

Jul 08, 2011

Apple on Friday said it was working to patch a vulnerability that hackers could use to break into the company's popular iPad, iPhone and iPod Touch gadgets.

Recommended for you

Digital dilemma: How will US respond to Sony hack?

Dec 18, 2014

The detective work blaming North Korea for the Sony hacker break-in appears so far to be largely circumstantial, The Associated Press has learned. The dramatic conclusion of a Korean role is based on subtle ...

UN General Assembly OKs digital privacy resolution

Dec 18, 2014

The U.N. General Assembly has approved a resolution demanding better digital privacy protections for people around the world, another response to Edward Snowden's revelations about U.S. government spying.

Online privacy to remain thorny issue: survey

Dec 18, 2014

Online privacy will remain a thorny issue over the next decade, without a widely accepted system that balances user rights and personal data collection, a survey of experts showed Thursday.

Spain: Google News vanishes amid 'Google Tax' spat

Dec 16, 2014

Google on Tuesday followed through with a pledge to shut down Google News in Spain in reaction to a Spanish law requiring news publishers to receive payment for content even if they are willing to give it away.

User comments : 3

Adjust slider to filter visible comments by rank

Display comments: newest first

210
1.8 / 5 (5) Feb 23, 2013
It is too clear and an ominous and foreboding cloud as arrived on the horizon. The nation-state backed and funded attacks are harbingers of extreme peril and danger. One day soon, something will be endangered, whose apparent worth or value seemed modest. But was the 'trip wire' that led to an avalanche of events that demanded a penultimate response - that led to an ultimate end.
Cyber-exploit has no START-Treaty, but it IS a strategic arms race!
One 'hack' too many, lives in the basement of a Beijing apartment building. A Moscow, backroom...A Denver garage...a Cairo library...a Jerusalem parlor. It appears as one thing and aims at a small target and it endangers, for example, all air traffic control over north america. Now something or someone has to be destroyed. You can call the premier of Shanghai or Beijing all you want. They can't do anything without disclosing too much, lives are at stake, quite by accident but, there is only ONE timely response to save them. Fix This!
word-
TheKnowItAll
1 / 5 (2) Feb 23, 2013
Perhaps system developers and application developers should be held accountable for the weaknesses that they leave in their systems. Not counting the backdoors left intentionally there are still a bunch of weaknesses that are left there simply by negligence and possibly by government order. Also, the people that install applications that are not signed should have to answer to someone. It's hard to charge someone for illegal entry when the door is left wide open!
alfie_null
1 / 5 (1) Feb 24, 2013
ominous and foreboding cloud

Dark and stormy?

There's no single vector. A simple, single prophylaxis is unrealistic.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.