Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Mobile Tech
Next Generation Data Center Is Here!
Average Rating:
Rate this article:  
Hackers Hit Washington Post -- Again
Hackers Hit Washington Post -- Again

By Jennifer LeClaire
December 19, 2013 12:22PM

    Bookmark and Share
Chinese hackers are being blamed for the latest breach of The Washington Post's servers. That's because evidence strongly pointed to Chinese hackers in a 2011 intrusion of The Washington Post’s network and in hacks against The New York Times, The Wall Street Journal and a wide range of Washington-based institutions.
 



The Washington Post seems to be a hacker favorite. The newspaper’s servers were breached again, the paper reported on Wednesday.

The Post said hackers gained access to employee user names and passwords in what it marked as at least the third intrusion over the past three years. The paper said the extent of the data loss is not clear, but employees have been instructed to change their user names and passwords -- even though they are stored in encrypted form -- based on the assumption that they may have been compromised.

“This is an ongoing investigation, but we believe it was a few days at most,” said spokeswoman Kris Coratti in the Post article. Cybersecurity firm Mandiant notified the paper of the breach and reported it was a “relatively short duration.”

Assessing the Damage

We turned to James Lyne, global head of security research at Sophos, for his thoughts on the latest incident at The Washington Post. He told us it is interesting to see continued examples of compromises focused on media organizations for presumably political or media subversion purposes.

“This is certainly not the first case of this in 2013 and we are likely to see more of them over the course of next year,” he said. “It is reassuring in this instance that the credentials stolen were in encrypted form -- though details on what standard of protection are lacking -- thus avoiding the loss of plaintext credentials as many did this year.”

As Lyne sees it, company-wide password reset is a sensible precaution, but he said one of the greatest challenges when dealing with an incident where attackers had access to your systems for even a short period is identifying what else they may have done.

“Did they only steal credentials or did they subvert other systems, plant backdoors or change content? As forensics on the incident conclude hopefully such other possibilities can be eliminated,” he said.

“This example should remind us all how cybercriminals and attacks have swung from being nearly entirely financially focused to political, principled or driven by corporate espionage. It is critical we all take steps to monitor and protect against such attacks and prepare solid incident response processes such that when (not if) it goes wrong damage can be limited,” he added.

Blaming China

In August, The Washington Post was attacked by the Syrian Electronic Army, a hacker group sympathetic to Syrian President Bashar al-Assad. At that time, the Post reported that the SEA briefly infiltrated its website and redirected readers of some stories to its own site. The attack lasted about 30 minutes and targeted foreign news stories specifically.

But the Chinese are suspect in this latest attack. The paper reports: “The company’s suspicions immediately focused on the possibility that Chinese hackers were responsible for the hack. Evidence strongly pointed to Chinese hackers in a 2011 intrusion of The Post’s network and in hacks against The New York Times, The Wall Street Journal and a wide range of Washington-based institutions, from think tanks to human rights groups and defense contractors.”
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Mobile Tech
1.   BBM Now Available on Windows Phone
2.   Virgin Mobile Offers Custom Plans
3.   Asana Revamps Mobile App
4.   Android 'Fake ID' Puts Millions at Risk
5.   FTC Wants Fix for Mobile Cramming


advertisement
Android 'Fake ID' Puts Millions at Risk
Users: stick to apps from Google Play.
Average Rating:
Dell, BlackBerry Downplay Threat
Say Apple-IBM alliance can't hurt them.
Average Rating:
BlackBerry Acquires Secusmart
German security firm offers street cred.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
New 'Backoff' Malware Slips Undetected into Retail Systems
'Malicious actors' are using a new variety of malware to access consumer payment data remotely through point-of-sale systems, according to a report from the Department of Homeland Security.
 
IBM Beefs Up Identity Intelligence Security Solutions
Big Blue is betting big on identity intelligence. IBM just acquired a private firm with security software to govern user access to apps and data across cloud and on-premise environments.
 
USB Security Flaw Lets Hackers Hijack PCs
Hackers can use the firmware that controls USB functions to take control of computers, say security experts. That means there may be a new class of attack for which there are no defenses.
 

Enterprise Hardware Spotlight
AMD's ARM-Based Opteron Out in $3K Dev Kit
It's dubbed "Seattle" and it's AMD's first 64-bit ARM-based Opteron processor. The low-power chip is being released as part of AMD’s Opteron A1100-series developer kit, and aimed at high-end data center needs.
 
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Dell, BlackBerry Not Sweating Apple-IBM Alliance
IBM's recent move to partner with Apple to sell iPhones and iPads loaded with corporate applications has excited investors in both companies, but two rivals say they are unperturbed for now.
 

Mobile Technology Spotlight
BlackBerry Messenger Now Available on Windows Phone
BlackBerry's free Messenger chatting and voice app is out of beta and widely available for Windows Phone users, the company said. BBM offers secure messaging, Groups, Voice, Channels and more.
 
Virgin Mobile Offers Custom Smartphone Plans
As the wireless carrier wars continue heating up, Virgin Mobile just threw the customization coal onto the fire. The firm has debuted a no-annual-contract plan with rates based on individual use.
 
Collaboration Provider Asana Revamps Mobile App
Asana, a collaboration software provider started by a Facebook founder, is now out with a rebuilt native iOS mobile app. It replaces one that even the company admits was not up to par.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.