Chinese hackers break into the New York Times, steal every employee’s password

Graham Cluley
Graham Cluley
@[email protected]

The New York Times has reported that for the last four months Chinese hackers have been infiltrating its networks, broken into the email accounts of senior staff, stolen the corporate passwords for every Times employee and used those to gain access to the personal computers of 53 employees.

New York Times story

According to the report, the first attack came in mid-September 2012 as the newspaper prepared to publish an investigation into the family of Chinese prime minister Wen Jiabao, who are said to have accumulated billions of dollars through business dealings.

Malware was planted on users’ computers which opened backdoors for the hackers to gain remote access to connected systems – including a domain controller that contained usernames and hashed passwords for all of the New York Times’ employees.

Sign up to our free newsletter.
Security news, advice, and tips.

The hackers were said to have broken into the email accounts of Shanghai bureau chief David Barboza – the reporter who had written the reports of Wen’s relatives – and Jim Yardley, who previously worked as the paper’s bureau chief in Beijing.

However, Jill Abramson, executive editor of the New York Times, was quoted as saying that experts had found “no evidence that sensitive emails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied”.

Of course, no evidence doesn’t mean that such information definitely wasn’t taken. After all, the hackers might have been able to cover their tracks if stealing such sensitive information.

You can understand why people who might have provided information for the investigation into Wen Jiabao’s family would want to be reassured that their identities had not been revealed to whoever was behind the hack. However, the newspaper is adamant that David Barboza’s research into the family’s business interests was based on public records.

In all, 45 custom-written malware samples are said to have been found on the network.

China flagSecurity experts brought in by the newspaper have pointed the finger of blame at China. And, in all likelihood, they’re right.

However, it must be remembered that it is extremely difficult to prove who is behind an internet attack like this. That’s because it’s so easy to use compromised computers around the world to route attacks through – disguising the true origin.

Of course, even if China is identified as the starting point of an attack – it doesn’t necessarily prove that it the operation is backed by the Chinese government or intelligence services. It could just as easily be a patriotic group of skilled, independent Chinese hackers upset with how the Western media is portraying their country’s rulers.

But let’s not be too naive… In all probability, the New York Times’s conclusion is correct, and this attack was sanctioned by the powers that be in Beijing.

Further reading: A short history of hacking attacks against the media.

Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and is the co-host of the popular "Smashing Security" podcast. Follow him on Twitter, Mastodon, Threads, Bluesky, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.