Microsoft the latest to be hit by hackers

Feb 23, 2013
The Microsoft logo seen on a tablet screen on December 4, 2012 in Paris. Microsoft joined Facebook and Apple on the list of US technology titans targeted in recent cyberattacks.

Microsoft joined Facebook and Apple on the list of US technology titans targeted in recent cyberattacks.

"As reported by and Apple, Microsoft can confirm that we also recently experienced a similar security intrusion," Trustworthy Computing team general manager Matt Thomlinson said in a blog post.

"During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations."

There was no evidence customer data was stolen but an investigation into the attack was continuing, according to Thomlinson.

"This type of is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries," he said.

Apple said Tuesday that hackers invaded its system in an attack similar to one recently carried out against Facebook, but that it repelled the intruders before its data was plundered.

The maker of iPhones, , iPods and said it was working with to hunt down the hackers, who appeared tied to a series of recent cybe attacks on US technology firms.

"The malware was employed in an attack against Apple and other companies, and was spread through a website for software developers," Apple told AFP.

The malicious software, or malware, took advantage of a vulnerability in a Java program used as a "plug-in" for Web-browsing programs.

A "small number" of computer systems at Apple were infected but they were isolated from the main network, according the Silicon Valley-based company.

"There is no evidence that any data left Apple," Apple said.

Word of hackers hitting Apple came just days after leading social network Facebook said it was "targeted in a " last month, but that no user data was compromised.

Facebook said malware that infected some of its machines came from a mobile developer website that had been booby-trapped.

Early this month, Twitter said it was hammered by a cyberattack similar to those that recently hit major Western news outlets, and that the passwords of about 250,000 users were stolen.

While those behind the attacks had yet to be identified, computer security industry specialists have expressed suspicions about China-sponsored hackers and Eastern European crime gangs.

Explore further: Startups offer banking for smartphone users

add to favorites email to friend print save as pdf

Related Stories

Hackers hit Apple in wake of Facebook attack

Feb 19, 2013

Apple on Tuesday said it suffered a cyber attack similar to the one recently carried out against Facebook, but that it repelled the invaders before its data was plundered.

Apple out to kill widespread Macintosh virus

Apr 11, 2012

Apple said it is crafting a weapon to vanquish a Flashback virus from Macintosh computers and working to disrupt the command network being used by hackers behind the infections. ...

Hackers pick Google's pocket with Mac virus

May 01, 2012

A virus infecting Macintosh computers is picking Google's pocket by hijacking advertising "clicks," tallying as much as $10,000 daily, according to Internet security firm Symantec.

Apple girding gadgets against hackers

Jul 08, 2011

Apple on Friday said it was working to patch a vulnerability that hackers could use to break into the company's popular iPad, iPhone and iPod Touch gadgets.

Recommended for you

Startups offer banking for smartphone users

Aug 30, 2014

The latest banks are small enough to fit in the palm of your hand. Startups, such as Moven and Simple, offer banking that's designed specifically for smartphones, enabling users to track their spending on the go. Some things ...

'SwaziLeaks' looks to shake up jet-setting monarchy

Aug 29, 2014

As WikiLeaks founder Julian Assange prepares to end a two-year forced stay at Ecuador's London embassy, he may take comfort in knowing he inspired resistance to secrecy in places as far away as Swaziland.

Ecuador heralds digital currency plans (Update)

Aug 29, 2014

Ecuador is planning to create what it calls the world's first digital currency issued by a central bank, which some analysts believe could be a first step toward abandoning the country's existing currency, ...

User comments : 3

Adjust slider to filter visible comments by rank

Display comments: newest first

1.8 / 5 (5) Feb 23, 2013
It is too clear and an ominous and foreboding cloud as arrived on the horizon. The nation-state backed and funded attacks are harbingers of extreme peril and danger. One day soon, something will be endangered, whose apparent worth or value seemed modest. But was the 'trip wire' that led to an avalanche of events that demanded a penultimate response - that led to an ultimate end.
Cyber-exploit has no START-Treaty, but it IS a strategic arms race!
One 'hack' too many, lives in the basement of a Beijing apartment building. A Moscow, backroom...A Denver garage...a Cairo library...a Jerusalem parlor. It appears as one thing and aims at a small target and it endangers, for example, all air traffic control over north america. Now something or someone has to be destroyed. You can call the premier of Shanghai or Beijing all you want. They can't do anything without disclosing too much, lives are at stake, quite by accident but, there is only ONE timely response to save them. Fix This!
1 / 5 (2) Feb 23, 2013
Perhaps system developers and application developers should be held accountable for the weaknesses that they leave in their systems. Not counting the backdoors left intentionally there are still a bunch of weaknesses that are left there simply by negligence and possibly by government order. Also, the people that install applications that are not signed should have to answer to someone. It's hard to charge someone for illegal entry when the door is left wide open!
1 / 5 (1) Feb 24, 2013
ominous and foreboding cloud

Dark and stormy?

There's no single vector. A simple, single prophylaxis is unrealistic.