Hackers who hit US media are back: security firm

Aug 12, 2013
The hackers who penetrated the computer network of The New York Times last year have resurfaced with an attack on "an organization involved in shaping economic policy," experts warned Monday.

The hackers who penetrated the computer network of The New York Times last year have resurfaced with an attack on "an organization involved in shaping economic policy," experts warned Monday.

The security firm FireEye said the original perpetrators "appear to be mounting fresh assaults that leverage new and improved versions of malware."

Revelations about the attacks on The New York Times and Wall Street Journal heightened tensions between Washington and Beijing, prompting harsh comments from the White House and other US officials.

Chinese officials repeatedly denied responsibility for the attacks, and since then the United States has in turn been accused of penetrating foreign networks through the spy programs revealed by leaker Edward Snowden.

FireEye said it had detected "a retooling of what believe is a massive spying operation based in China."

"The new campaigns mark the first significant stirrings from the group since it went silent in January in the wake of a detailed expose of the group and its exploits," FireEye researchers Ned Moran and Nart Villeneuve said in a blog post.

FireEye said its researchers "spotted the malware when analyzing a recent attempted attack on an organization involved in shaping economic policy."

The name of the organization was not disclosed.

The security firm said the malware "uses new network traffic patterns, possibly to evade traditional ."

The New York Times said in January that hackers stole its corporate passwords and accessed the personal computers of 53 employees after the newspaper published a report on the family fortune of China's Premier Wen Jiabao.

The Wall Street Journal said later its computers were also hit by Chinese hackers. The Journal said in a news article that the attacks were "for the apparent purpose of monitoring the newspaper's China coverage" and suggest that Chinese spying on US media "has become a widespread phenomenon."

Explore further: Turkey still hopes Twitter will open local office

add to favorites email to friend print save as pdf

Related Stories

NY Times says Chinese hacked paper's computers (Update)

Jan 31, 2013

Chinese hackers repeatedly penetrated The New York Times' computer systems over the past four months, stealing reporters' passwords and hunting for files on an investigation into the wealth amassed by the family of a top ...

China Communist paper rejects hacking allegations

Feb 04, 2013

The official mouthpiece of China's ruling Communist Party on Monday roundly rejected claims of hacking attacks from China by American media outlets, hinting instead at ulterior motives by the US.

Claims of hacking New York Times 'groundless': China

Jan 31, 2013

China on Thursday dismissed accusations that it had hacked into the system of the New York Times, in a cyberattack the paper linked to its expose of the wealth amassed by the family of Premier Wen Jiabao. ...

US, China trade charges on cyberattacks

Feb 19, 2013

The United States and China on Tuesday traded charges over cyberattacks after a security firm alleged that Beijing controled hackers who have penetrated the US government, companies and media.

Washington Post joins list of hacked US media

Feb 02, 2013

The Washington Post disclosed Saturday that it had suffered a cyberattack and suspects Chinese hackers were behind it, joining Twitter and major US media outlets that have endured intrusions.

Recommended for you

White House updating online privacy policy

40 minutes ago

A new Obama administration privacy policy out Friday explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites. It also clarifies that ...

Net neutrality balancing act

19 hours ago

Researchers in Italy, writing in the International Journal of Technology, Policy and Management have demonstrated that net neutrality benefits content creator and consumers without compromising provider innovation nor pr ...

Twitter rules out Turkey office amid tax row

Apr 16, 2014

Social networking company Twitter on Wednesday rejected demands from the Turkish government to open an office there, following accusations of tax evasion and a two-week ban on the service.

How does false information spread online?

Apr 16, 2014

Last summer the World Economic Forum (WEF) invited its 1,500 council members to identify top trends facing the world, including what should be done about them. The WEF consists of 80 councils covering a wide range of issues including social media. Members come ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

clay_ferguson
1 / 5 (5) Aug 12, 2013
The title of this article has the left and right sides of the colon ":" reversed. You put whoever SAID something on the left, and WHAT they said goes on the right. It's been this way for about 100 years. No need to change it.

More news stories

Venture investments jump to $9.5B in 1Q

Funding for U.S. startup companies soared 57 percent in the first quarter to a level not seen since 2001, as venture capitalists piled more money into an increasing number of deals, according to a report due out Friday.

White House updating online privacy policy

A new Obama administration privacy policy out Friday explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites. It also clarifies that ...

Hackathon team's GoogolPlex gives Siri extra powers

(Phys.org) —Four freshmen at the University of Pennsylvania have taken Apple's personal assistant Siri to behave as a graduate-level executive assistant which, when asked, is capable of adjusting the temperature ...

Scientists tether lionfish to Cayman reefs

Research done by U.S. scientists in the Cayman Islands suggests that native predators can be trained to gobble up invasive lionfish that colonize regional reefs and voraciously prey on juvenile marine creatures.

Leeches help save woman's ear after pit bull mauling

(HealthDay)—A pit bull attack in July 2013 left a 19-year-old woman with her left ear ripped from her head, leaving an open wound. After preserving the ear, the surgical team started with a reconnection ...