Men in Proxy Blog

A blog covering the most interesting topics about online anonymity and Internet security!

Is New York Times hacking just the beginning?

Posted on: April 21st, 2013

Is New York Times hacking just the beginningOn Wednesday night, The New York Times declared it had been the mark of assaults from hackers in China for the last four months. The assaults followed an inquiry by Times journalist David Barboza into the private assets of Chinese Premier Wen Jiabao. Times administrators alleged the Chinese administration had cautioned that the member of Wen’s associations would “have effects,” which prompted the newspaper’s managers to request AT&T to look at their network for strange activity.

The hackers were capable of stealing the company secret codes of each Times employee, in addition to burgle the private computers of 53 workers.

In a meeting Thursday, a director with the PC-Security Corporation the Times appointed to end the assault states the breach mirrors a shocking distinction between Chinese and Western hackers.

Richard Bejtlich, chief security representative of Alexandria, VA.-Based Mandiant, states the company has recognized the group within as APT-12 (Advanced Persistent Threat- 12). “The extremely large picture is the Chinese administration carries out state actions that are not as good as the West,” he informs The Daily Beast.

In the West, he clarifies; assaults are bound for intelligence communities and military facilities. However Chinese hackers target civilian targets, for instance banks, media organizations, defense service providers, and law firms (if a certain company is too complex to burgle, Bejtlich states, “they visit a supplier or their law firm for information). One explanation for this distinction in viewpoint: in China, these groups are state-held, not like in the West.

Whereas the Times states investigators still do not recognize how the hackers at first broke in, it believes it was a “spear phishing” assault, which implies emails with spiteful attachments or links were sent to workers. Once in the system, the tools can be utilized to pilfer tons of information and capture keystrokes, passwords, documents, screen images, and, in a number of cases, footages from computers’ web cameras and microphones. Several experts told the Times that the techniques employed in the assault have been linked with the Chinese forces in the past.

However, who are the associates of APT-12? Bejtlich declares it is tough to say, however there are 4 communities from where they may hail: China’s contractors, uniformed military, members of a country militia, or perhaps “patriotic hackers.” Patriotic hackers, like the given name suggested, are people who wage cyber warfare on behalf of a country. Whereas the U.S. has loyal hackers also, those who work autonomous of the military, regardless of their inspiration, are indicted; in China, provided that they do not assault the Chinese administration, they are treated like stars, Bejtlich states.

What is inspiring regarding APT-12 and other refined hacking groups is not their capability to gain access into systems, Bejtlich declares, however their capability to get in devoid of being noticed.


You can follow any responses to this entry through the RSS 2.0 feed.

AddThis Social Bookmark Button

Leave your comment