Microsoft the latest to be hit by hackers

Feb 23, 2013
The Microsoft logo seen on a tablet screen on December 4, 2012 in Paris. Microsoft joined Facebook and Apple on the list of US technology titans targeted in recent cyberattacks.

Microsoft joined Facebook and Apple on the list of US technology titans targeted in recent cyberattacks.

"As reported by and Apple, Microsoft can confirm that we also recently experienced a similar security intrusion," Trustworthy Computing team general manager Matt Thomlinson said in a blog post.

"During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations."

There was no evidence customer data was stolen but an investigation into the attack was continuing, according to Thomlinson.

"This type of is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries," he said.

Apple said Tuesday that hackers invaded its system in an attack similar to one recently carried out against Facebook, but that it repelled the intruders before its data was plundered.

The maker of iPhones, , iPods and said it was working with to hunt down the hackers, who appeared tied to a series of recent cybe attacks on US technology firms.

"The malware was employed in an attack against Apple and other companies, and was spread through a website for software developers," Apple told AFP.

The malicious software, or malware, took advantage of a vulnerability in a Java program used as a "plug-in" for Web-browsing programs.

A "small number" of computer systems at Apple were infected but they were isolated from the main network, according the Silicon Valley-based company.

"There is no evidence that any data left Apple," Apple said.

Word of hackers hitting Apple came just days after leading social network Facebook said it was "targeted in a " last month, but that no user data was compromised.

Facebook said malware that infected some of its machines came from a mobile developer website that had been booby-trapped.

Early this month, Twitter said it was hammered by a cyberattack similar to those that recently hit major Western news outlets, and that the passwords of about 250,000 users were stolen.

While those behind the attacks had yet to be identified, computer security industry specialists have expressed suspicions about China-sponsored hackers and Eastern European crime gangs.

Explore further: Austria court throws out Facebook privacy class action suit

Related Stories

Hackers hit Apple in wake of Facebook attack

Feb 19, 2013

Apple on Tuesday said it suffered a cyber attack similar to the one recently carried out against Facebook, but that it repelled the invaders before its data was plundered.

Apple out to kill widespread Macintosh virus

Apr 11, 2012

Apple said it is crafting a weapon to vanquish a Flashback virus from Macintosh computers and working to disrupt the command network being used by hackers behind the infections. ...

Hackers pick Google's pocket with Mac virus

May 01, 2012

A virus infecting Macintosh computers is picking Google's pocket by hijacking advertising "clicks," tallying as much as $10,000 daily, according to Internet security firm Symantec.

Apple girding gadgets against hackers

Jul 08, 2011

Apple on Friday said it was working to patch a vulnerability that hackers could use to break into the company's popular iPad, iPhone and iPod Touch gadgets.

Recommended for you

New approach to online compatibility

Jun 30, 2015

Many of the online social networks match users with each other based on common keywords and assumed shared interests based on their activity. A new approach that could help users find new friends and contacts with a greater ...

Most internet anonymity software leaks users' details

Jun 29, 2015

Virtual Private Networks (VPNs) are legal and increasingly popular for individuals wanting to circumvent censorship, avoid mass surveillance or access geographically limited services like Netflix and BBC ...

WikiLeaks says NSA spied on French business

Jun 29, 2015

WikiLeaks has released documents that it says show that the U.S. National Security Agency eavesdropped on France's top finance officials and high-stakes French export bids over a decade in what the group called targeted economic ...

Google gets extended deadline to answer EU case

Jun 29, 2015

Brussels has given Google an extension until mid-August to answer an anti-trust case alleging that the tech giant abuses its search engine's market dominance, a company spokesman said Monday.

User comments : 3

Adjust slider to filter visible comments by rank

Display comments: newest first

1.8 / 5 (5) Feb 23, 2013
It is too clear and an ominous and foreboding cloud as arrived on the horizon. The nation-state backed and funded attacks are harbingers of extreme peril and danger. One day soon, something will be endangered, whose apparent worth or value seemed modest. But was the 'trip wire' that led to an avalanche of events that demanded a penultimate response - that led to an ultimate end.
Cyber-exploit has no START-Treaty, but it IS a strategic arms race!
One 'hack' too many, lives in the basement of a Beijing apartment building. A Moscow, backroom...A Denver garage...a Cairo library...a Jerusalem parlor. It appears as one thing and aims at a small target and it endangers, for example, all air traffic control over north america. Now something or someone has to be destroyed. You can call the premier of Shanghai or Beijing all you want. They can't do anything without disclosing too much, lives are at stake, quite by accident but, there is only ONE timely response to save them. Fix This!
1 / 5 (2) Feb 23, 2013
Perhaps system developers and application developers should be held accountable for the weaknesses that they leave in their systems. Not counting the backdoors left intentionally there are still a bunch of weaknesses that are left there simply by negligence and possibly by government order. Also, the people that install applications that are not signed should have to answer to someone. It's hard to charge someone for illegal entry when the door is left wide open!
1 / 5 (1) Feb 24, 2013
ominous and foreboding cloud

Dark and stormy?

There's no single vector. A simple, single prophylaxis is unrealistic.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.