Washington Post Servers Infiltrated, Employee Credentials StolenWashington Post Servers Infiltrated, Employee Credentials Stolen
Newspaper suffers second major breach in three years, Chinese espionage suspected
December 19, 2013
The Washington Post late today reported that its servers were hacked and employee usernames and passwords were compromised in the attack, which was detected by a contractor that monitors the news organization's network.
Post officials today were alerted by incident response and detection firm Mandiant. Officials at the media organization believe the intrusion may only have been in the works for a few days, although they do not yet have full details on the breadth of the exposed information. Post employees are being urged to change their usernames and passwords, even though those passwords were encrypted.
The news organization's publishing system, email, and employee personal information appear to be safe despite the breach, the report says.
A server used by the Post's foreign staff was initially infiltrated, which then led to the breach of other company servers, the report says.
Chinese cyberespionage attackers are considered a likely culprit, especially given the 2011 breach of the Post's network that had the earmarks of a cyberspying mission out of China. That attack appeared to be part of a campaign of targeted attacks against major media outlets, human rights groups, and defense contractors. The New York Times and The Wall Street Journal were also hit in those attacks.
The Post in August was the target of the Syrian Electronic Army (SEA) hacktivist group, which employed a phishing attack that resulted in a Post staff writer's personal Twitter account being hijacked by the SEA to post its own messages. And some articles from the Post's website were temporarily redirected to the SEA's website.
Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Get the Gartner Report: SOC Model Guide
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage