New York Times says targeted by China hackers after Wen: Report

Advertisement
By Reuters | Updated: 31 January 2013 13:20 IST
The New York Times said on Thursday that Chinese hackers had "persistently" attacked its computers over the past four months since the paper published a story on Premier Wen Jiabao, but sensitive material related to the report was not accessed.

The New York Times said the attacks coincided with its report last October that Wen's family had accumulated at least $2.7 billion in "hidden riches". China said at the time the report smeared its name and had ulterior motives.

"For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees," The Times said on Thursday.

"Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times's network."

Advertisement

The hackers broke into the e-mail accounts of Shanghai bureau chief, David Barboza, who wrote the story on Wen's family, and Jim Yardley, the paper's South Asia bureau chief in India who was previously the Beijing bureau chief, it added.

Advertisement

"Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied," said Jill Abramson, the paper's executive editor.

Security experts found evidence that the hackers stole the corporate passwords for every Times employee and used those to gain access to the personal computers of 53 employees, most of them outside The Times's newsroom, the paper said.

Advertisement

"Experts found no evidence that the intruders used the passwords to seek information that was not related to the reporting on the Wen family."

Computer security experts at Mandiant, the company hired by the newspaper, said the hackers tried to "cloak" the source of their attacks "by first penetrating computers at United States universities and routing the attacks through them".

Advertisement

"This matches the subterfuge used in many other attacks that Mandiant has tracked to China."

The Chinese government has repeatedly said it opposes hacking and that China too suffers frequently from these kinds of attacks.

© Thomson Reuters 2013

 

Catch the latest from the Consumer Electronics Show on Gadgets 360, at our CES 2026 hub.

Advertisement

Related Stories

Popular Mobile Brands
  1. Samsung Galaxy S26 Series Roundup: Everything That We Know So Far
  2. CNAP vs Truecaller: Which Is Better at Identifying Spam Calls?
  1. Quantum Haloscope Sharpens the Search for Dark Matter Axions at Higher Frequencies
  2. Rare Interstellar Object 3I/ATLAS Fails Alien Test, Scientists Say
  3. CNAP vs Truecaller: How India’s Official Caller ID System Differs From the Popular App
  4. Prayagraj Ki Love Story Set to Stream Soon on Hungama OTT
  5. Mask OTT Release Date: When and Where to Watch This Action-Packed Thriller Online?
  6. New Year 2026 Custom Greetings: 5 Best AI Prompts for ChatGPT, Gemini, and Other AI Tools
  7. NASA’s Chandra Spots Champagne Cluster Formed by a Massive Galaxy Collision
  8. NASA’s Curiosity Rover Sends Stunning Sunrise-and-Sunset Holiday Postcard from Mars
  9. Oppo Find X9s Key Specifications Leaked Again; Might Also Launch in India
  10. Redmi Turbo 5, Redmi Turbo 5 Pro to Be Equipped With Upcoming MediaTek Dimensity Chips, Tipster Claims
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.