News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
GET RECOGNIZED
Let an ISACA® certification elevate your career.
Register today and save
You are here: Home / Mobile Tech / Hackers Hit Washington Post Again
DDoS Protection Powered By Verisign
Hackers Hit Washington Post -- Again
Hackers Hit Washington Post -- Again
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
DECEMBER
19
2013


The Washington Post seems to be a hacker favorite. The newspaper’s servers were breached again, the paper reported on Wednesday.

The Post said hackers gained access to employee user names and passwords in what it marked as at least the third intrusion over the past three years. The paper said the extent of the data loss is not clear, but employees have been instructed to change their user names and passwords -- even though they are stored in encrypted form -- based on the assumption that they may have been compromised.

“This is an ongoing investigation, but we believe it was a few days at most,” said spokeswoman Kris Coratti in the Post article. Cybersecurity firm Mandiant notified the paper of the breach and reported it was a “relatively short duration.”

Assessing the Damage

We turned to James Lyne, global head of security research at Sophos, for his thoughts on the latest incident at The Washington Post. He told us it is interesting to see continued examples of compromises focused on media organizations for presumably political or media subversion purposes.

“This is certainly not the first case of this in 2013 and we are likely to see more of them over the course of next year,” he said. “It is reassuring in this instance that the credentials stolen were in encrypted form -- though details on what standard of protection are lacking -- thus avoiding the loss of plaintext credentials as many did this year.”

As Lyne sees it, company-wide password reset is a sensible precaution, but he said one of the greatest challenges when dealing with an incident where attackers had access to your systems for even a short period is identifying what else they may have done.

“Did they only steal credentials or did they subvert other systems, plant backdoors or change content? As forensics on the incident conclude hopefully such other possibilities can be eliminated,” he said.

“This example should remind us all how cybercriminals and attacks have swung from being nearly entirely financially focused to political, principled or driven by corporate espionage. It is critical we all take steps to monitor and protect against such attacks and prepare solid incident response processes such that when (not if) it goes wrong damage can be limited,” he added.

Blaming China

In August, The Washington Post was attacked by the Syrian Electronic Army, a hacker group sympathetic to Syrian President Bashar al-Assad. At that time, the Post reported that the SEA briefly infiltrated its website and redirected readers of some stories to its own site. The attack lasted about 30 minutes and targeted foreign news stories specifically.

But the Chinese are suspect in this latest attack. The paper reports: “The company’s suspicions immediately focused on the possibility that Chinese hackers were responsible for the hack. Evidence strongly pointed to Chinese hackers in a 2011 intrusion of The Post’s network and in hacks against The New York Times, The Wall Street Journal and a wide range of Washington-based institutions, from think tanks to human rights groups and defense contractors.”

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN MOBILE TECH
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Who Is the Hacker Group Lizard Squad?
Are they dangerous or just obnoxious? That’s what many are wondering about the hacker group Lizard Squad, which tweeted out a bomb threat that grounded a flight with a Sony exec aboard.
 
Are Government Spies Tipping Off Tor?
Less than a month ago, tech news headlines heralded a Tor Project breach. Now, some are saying that government spies are sharing information with Tor to help it prevent future breaches.
 
Backoff Malware Hits 1,000+ Businesses, Likely More
More than 1,000 businesses across the U.S. might have been affected by Backoff, a new kind of point-of-sale (PoS) malware, according to the Department of Homeland Security.
 

Enterprise Hardware Spotlight
Apple Set To Release Largest iPad Ever
Tech giant Apple seems to have adopted the mantra “go big or go home.” The company is planning to introduce its largest iPad ever: a 12.9-inch behemoth that will dwarf its largest existing models.
 
Alert: HP Recalls 5 Million Notebook AC Power Cords
HP is recalling about 5.6 million notebook computer AC power cords in the U.S. and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard.
 
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 

Mobile Technology Spotlight
Apple Set To Release Largest iPad Ever
Tech giant Apple seems to have adopted the mantra “go big or go home.” The company is planning to introduce its largest iPad ever: a 12.9-inch behemoth that will dwarf its largest existing models.
 
Verizon Hops on the Voice-Over-LTE Bandwagon
Wireless provider Verizon is gearing up for a nationwide launch of its Voice-over-LTE service over the next several weeks, promising clearer and crisper phone calls and a Skype-like video service.
 
Smartphone 'Kill Switch' Law in California; Will Other States Follow?
California’s new law -- signed by Gov. Jerry Brown on Monday -- aimed at deterring cellphone theft could mean most mobile phones sold in the U.S. will soon include similar “kill-switch” tech.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.