Attacks/Breaches
12/18/2013
06:21 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%
Repost This

Washington Post Servers Infiltrated, Employee Credentials Stolen

Newspaper suffers second major breach in three years, Chinese espionage suspected

The Washington Post late today reported that its servers were hacked and employee usernames and passwords were compromised in the attack, which was detected by a contractor that monitors the news organization's network.

Post officials today were alerted by incident response and detection firm Mandiant. Officials at the media organization believe the intrusion may only have been in the works for a few days, although they do not yet have full details on the breadth of the exposed information. Post employees are being urged to change their usernames and passwords, even though those passwords were encrypted.

The news organization's publishing system, email, and employee personal information appear to be safe despite the breach, the report says.

A server used by the Post's foreign staff was initially infiltrated, which then led to the breach of other company servers, the report says.

Chinese cyberespionage attackers are considered a likely culprit, especially given the 2011 breach of the Post's network that had the earmarks of a cyberspying mission out of China. That attack appeared to be part of a campaign of targeted attacks against major media outlets, human rights groups, and defense contractors. The New York Times and The Wall Street Journal were also hit in those attacks.

The Post in August was the target of the Syrian Electronic Army (SEA) hacktivist group, which employed a phishing attack that resulted in a Post staff writer's personal Twitter account being hijacked by the SEA to post its own messages. And some articles from the Post's website were temporarily redirected to the SEA's website.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jries921
50%
50%
jries921,
User Rank: Apprentice
12/19/2013 | 7:29:24 PM
re: Washington Post Servers Infiltrated, Employee Credentials Stolen
If it was the Chinese, I'm guessing that they were looking for sources (dissidents?). A newspaper isn't typically where you find military/diplomatic secrets.
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2014-0778
Published: 2014-04-19
The TCPUploader module in Progea Movicon 11.4 before 11.4.1150 allows remote attackers to obtain potentially sensitive version information via network traffic to TCP port 10651.

CVE-2014-1974
Published: 2014-04-19
Directory traversal vulnerability in LYSESOFT AndExplorer before 20140403 and AndExplorerPro before 20140405 allows attackers to overwrite or create arbitrary files via unspecified vectors.

CVE-2014-1983
Published: 2014-04-19
Unspecified vulnerability in Cybozu Remote Service Manager through 2.3.0 and 3.x before 3.1.1 allows remote attackers to cause a denial of service (CPU consumption) via unknown vectors.

Best of the Web