Microsoft the latest to be hit by hackers

Feb 23, 2013
The Microsoft logo seen on a tablet screen on December 4, 2012 in Paris. Microsoft joined Facebook and Apple on the list of US technology titans targeted in recent cyberattacks.

Microsoft joined Facebook and Apple on the list of US technology titans targeted in recent cyberattacks.

"As reported by and Apple, Microsoft can confirm that we also recently experienced a similar security intrusion," Trustworthy Computing team general manager Matt Thomlinson said in a blog post.

"During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations."

There was no evidence customer data was stolen but an investigation into the attack was continuing, according to Thomlinson.

"This type of is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries," he said.

Apple said Tuesday that hackers invaded its system in an attack similar to one recently carried out against Facebook, but that it repelled the intruders before its data was plundered.

The maker of iPhones, , iPods and said it was working with to hunt down the hackers, who appeared tied to a series of recent cybe attacks on US technology firms.

"The malware was employed in an attack against Apple and other companies, and was spread through a website for software developers," Apple told AFP.

The malicious software, or malware, took advantage of a vulnerability in a Java program used as a "plug-in" for Web-browsing programs.

A "small number" of computer systems at Apple were infected but they were isolated from the main network, according the Silicon Valley-based company.

"There is no evidence that any data left Apple," Apple said.

Word of hackers hitting Apple came just days after leading social network Facebook said it was "targeted in a " last month, but that no user data was compromised.

Facebook said malware that infected some of its machines came from a mobile developer website that had been booby-trapped.

Early this month, Twitter said it was hammered by a cyberattack similar to those that recently hit major Western news outlets, and that the passwords of about 250,000 users were stolen.

While those behind the attacks had yet to be identified, computer security industry specialists have expressed suspicions about China-sponsored hackers and Eastern European crime gangs.

Explore further: Google to help boost Greece's tourism industry

add to favorites email to friend print save as pdf

Related Stories

Hackers hit Apple in wake of Facebook attack

Feb 19, 2013

Apple on Tuesday said it suffered a cyber attack similar to the one recently carried out against Facebook, but that it repelled the invaders before its data was plundered.

Apple out to kill widespread Macintosh virus

Apr 11, 2012

Apple said it is crafting a weapon to vanquish a Flashback virus from Macintosh computers and working to disrupt the command network being used by hackers behind the infections. ...

Hackers pick Google's pocket with Mac virus

May 01, 2012

A virus infecting Macintosh computers is picking Google's pocket by hijacking advertising "clicks," tallying as much as $10,000 daily, according to Internet security firm Symantec.

Apple girding gadgets against hackers

Jul 08, 2011

Apple on Friday said it was working to patch a vulnerability that hackers could use to break into the company's popular iPad, iPhone and iPod Touch gadgets.

Recommended for you

Google to help boost Greece's tourism industry

54 minutes ago

Internet giant Google will offer management courses to 3,000 tourism businesses on the island of Crete as part of an initiative to promote the sector in Greece, industry union Sete said on Thursday.

Music site SoundCloud to start paying artists

7 hours ago

SoundCloud said Thursday that it will start paying artists and record companies whose music is played on the popular streaming site, a move that will bring it in line with competitors such as YouTube and Spotify.

Facebook awards 'Internet Defense Prize'

16 hours ago

Facebook awarded a $50,000 Internet Defense Prize to a pair of German researchers with a seemingly viable approach to detecting vulnerabilities in Web applications.

Twitter tries to block images of Foley killing

Aug 20, 2014

Twitter and some other social media outlets are trying to block the spread of gruesome images of the beheading of journalist James Foley by Islamic State militants, while a movement to deny his killers publicity ...

User comments : 3

Adjust slider to filter visible comments by rank

Display comments: newest first

210
1.8 / 5 (5) Feb 23, 2013
It is too clear and an ominous and foreboding cloud as arrived on the horizon. The nation-state backed and funded attacks are harbingers of extreme peril and danger. One day soon, something will be endangered, whose apparent worth or value seemed modest. But was the 'trip wire' that led to an avalanche of events that demanded a penultimate response - that led to an ultimate end.
Cyber-exploit has no START-Treaty, but it IS a strategic arms race!
One 'hack' too many, lives in the basement of a Beijing apartment building. A Moscow, backroom...A Denver garage...a Cairo library...a Jerusalem parlor. It appears as one thing and aims at a small target and it endangers, for example, all air traffic control over north america. Now something or someone has to be destroyed. You can call the premier of Shanghai or Beijing all you want. They can't do anything without disclosing too much, lives are at stake, quite by accident but, there is only ONE timely response to save them. Fix This!
word-
TheKnowItAll
1 / 5 (2) Feb 23, 2013
Perhaps system developers and application developers should be held accountable for the weaknesses that they leave in their systems. Not counting the backdoors left intentionally there are still a bunch of weaknesses that are left there simply by negligence and possibly by government order. Also, the people that install applications that are not signed should have to answer to someone. It's hard to charge someone for illegal entry when the door is left wide open!
alfie_null
1 / 5 (1) Feb 24, 2013
ominous and foreboding cloud

Dark and stormy?

There's no single vector. A simple, single prophylaxis is unrealistic.