For the past four months, Chinese hackers have persistently attacked the New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.
After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, the Times and computer security experts have expelled the attackers and kept them from breaking back in.
The timing of the attacks coincided with the report of a Times investigation, published online on Oct. 25, that found that the relatives of Chinese Premier Wen Jiabao (溫家寶) had accumulated a fortune worth several billion of US dollars through business dealings.
Security experts hired by the Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached the Times’ network.
They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Wen’s relatives, and Jim Yardley, the Times’ South Asia bureau chief in India, who previously worked as bureau chief in Beijing.
“Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,” Times executive editor Jill Abramson said.
The hackers tried to cloak the source of the attacks on the Times by first penetrating computers at US universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by the Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China.
The attackers first installed malicious software, or malware, that enabled them to gain entry to any computer on the Times’ network. The malware was identified by computer security experts as a specific strain associated with computer attacks originating in China. More evidence of the source, experts said, is that the attacks started from the same university computers used by the Chinese military to attack US military contractors in the past.
Security experts found evidence that the hackers stole the corporate passwords of every Times employee and used those to gain access to the computers of 53 employees, most of them outside the Times’ newsroom.
Experts found no evidence that the intruders used the passwords to seek information that was not related to the reporting on the Wen family.
No customer data was stolen from the Times, they said.
Asked about evidence that indicated the hacking originated in China, China’s Ministry of National Defense on Wednesday said that “to accuse the Chinese military of launching cyberattacks without solid proof is unprofessional and baseless.”
In Beijing, Chinese Ministry of Foreign Affairs spokesman Hong Lei (洪磊) told reporters: “The competent Chinese authorities have already issued a clear response to the groundless accusations made by the New York Times.”
Asked about cyberspying and hacking accusations made against China in general, he said: “To arbitrarily assert and to conclude without hard evidence that China participated in such hacking attacks is totally irresponsible.”
“China is also a victim of hacking attacks. Chinese laws clearly forbid hacking attacks, and we hope relevant parties takes a responsible attitude on this issue,” he said.
Additional reporting by AFP
The nation’s fastest supercomputer, Nano 4 (晶創26), is scheduled to be launched in the third quarter, and would be used to train large language models in finance and national defense sectors, the National Center for High-Performance Computing (NCHC) said. The supercomputer, which would operate at about 86.05 petaflops, is being tested at a new cloud computing center in the Southern Taiwan Science Park in Tainan. The exterior of the server cabinet features chip circuitry patterns overlaid with a map of Taiwan, highlighting the nation’s central position in the semiconductor industry. The center also houses Taiwania 2, Taiwania 3, Forerunner 1 and
FIRST TRIAL: Ko’s lawyers sought reduced bail and other concessions, as did other defendants, but the bail judge denied their requests, citing the severity of the sentences Former Taipei mayor Ko Wen-je (柯文哲) was yesterday sentenced to 17 years in prison and had his civil rights suspended for six years over corruption, embezzlement and other charges. Taipei prosecutors in December last year asked the Taipei District Court for a combined 28-year, six-month sentence for the four cases against Ko, who founded the Taiwan People’s Party (TPP). The cases were linked to the Core Pacific City (京華城購物中心) redevelopment project and the mismanagement of political donations. Other defendants convicted on separate charges included Chinese Nationalist Party (KMT) Taipei City Councilor Angela Ying (應曉薇), who was handed a 15-year, six-month sentence; Core Pacific
J-6 REMODEL: The converted drones are part of Beijing’s expanding mix of airpower weapons, including bombers with stand-off missiles and UAV swarms, the report said China has stationed obsolete supersonic fighters converted to attack drones at six air bases close to the Taiwan Strait, a report published this month by the Arlington, Virginia-based Mitchell Institute for Aerospace Studies said. Satellite imagery of the airfields from the institute’s “China Airpower Tracker” shows what appear to be lines of stubby, swept-winged aircraft matching the shape of J-6 fighters that first flew with the Chinese People’s Liberation Army (PLA) Air Force in the 1960s. Since their conversion to drones, the aircraft have been identified at five bases in China’s Fujian Province and one in Guangdong Province, the report said. J.
China used fake LinkedIn profiles to harvest sensitive data from NATO and EU institutions by soliciting information from staff, a European security source said on Friday. The operation, allegedly orchestrated by the Chinese Ministry of State Security, targeted dozens of employees at the military alliance or EU organizations through fictitious accounts, the source said, confirming reports in French and Belgian media. Posing as recruiters on the online professional networking platform, Chinese spies would initially request paid reports before later soliciting non-public or even classified information. One particularly active fake profile used the name “Kevin Zhang,” claiming to be the head