• Disclosure
  • Privacy Policy
  • DMCA Policy
  • CCPA
  • Medical Disclaimer
Monday, March 27, 2023
Ellis County News Online
  • Home
  • News
  • Business
  • Technology
    • Crytpocurrency
    • Gaming
    • Gadgets
  • Sports
  • Health
  • General
    • Business Services
  • Travel
  • Press Releases
  • Popular
No Result
View All Result
  • Home
  • News
  • Business
  • Technology
    • Crytpocurrency
    • Gaming
    • Gadgets
  • Sports
  • Health
  • General
    • Business Services
  • Travel
  • Press Releases
  • Popular
No Result
View All Result
No Result
View All Result
Home Technology Gaming

Hackers Targeted News Corp’s Tech Suppliers – Livemint

hackers-targeted-news-corp’s-tech-suppliers-–-livemint
Share on FacebookShare on Twitter

Home / Companies / News /  Hackers targeted News Corp’s tech suppliers

BloombergPremium
Bloomberg

wsj 4 min read . Updated: 06 Feb 2022, 06:44 PM IST DAVID UBERTI, The Wall Street Journal

  • Investigators believe hackers accessed emails and documents to aid Chinese intelligence

Hackers with suspected links to China targeted News Corp’s third-party technology suppliers, according to a company filing.

News Corp, which owns the New York Post and The Wall Street Journal parent Dow Jones, said it was the target of a hack that accessed emails and documents of journalists and other employees.

The company in a securities filing on Friday said it “relies on third-party providers for certain technology and ‘cloud-based’ systems and services that support a variety of business operations,” and that one of these systems “was the target of persistent cyberattack activity.”

The attack came as U.S. officials over the past year have been increasingly warning of criminal and nation-state hackers breaking into the computer systems of organizations through sometimes opaque supply chains for software and other technologies.

A News Corp spokesman on Friday declined to comment on its vendors or which data was stolen, citing a continuing investigation. In its email to staff, News Corp said that computer systems housing consumer and financial data weren’t affected.

“In addition, we have not experienced related interruptions to our business operations,” Chief Technology Officer David Kline and Chief Information Security Officer Billy O’Brien wrote in the email. “Based on our investigation to date, we believe the threat activity is contained.”

Messrs. Kline and O’Brien said their inquiry is in its early stages.

The Wall Street Journal reported Friday that hackers had access to News Corp’s systems since at least February 2020, gaining access to emails and Google Docs, including drafts of articles. Beijing that year expelled U.S. journalists employed by news outlets including the Journal, the New York Times and the Washington Post.

Gaining access to emails and documents could give hackers snapshots of reporters’ sources and plans for articles, said Runa Sandvik, a former senior director for information security at the New York Times.

“Let’s say attackers get access to emails. Then, potentially, there could be communications about who is going to cover the Olympics in China,” said Ms. Sandvik, who now consults for media organizations. “How are they collaborating?”

News Corp said Friday it disclosed the hack to law-enforcement officials and is providing technical details of the attack to the Media and Entertainment Information Sharing and Analysis Center, a nonprofit that shares security information among the media industry.

Chris Taylor, director of the ME-ISAC, declined to comment on any data News Corp shared, as companies report such information under the promise of anonymity. In most incidents analyzed by the nonprofit, hackers blast out phishing emails to countless potential targets in the hope of landing a victim, Mr. Taylor said.

Attacks tailored for specific organizations “are scarier but they are way less frequent,” he said. “Attackers will do more research.”

Mandiant Inc., a cybersecurity company that specializes in investigating hacks, is helping News Corp respond to the incident.

“Mandiant assesses that those behind this activity have a China nexus, and we believe they are likely involved in espionage activities to collect intelligence to benefit China’s interests,” said David Wong, Mandiant’s vice president of consulting.

“China firmly opposes and combats cyber attacks and cyber theft in all forms,” a spokesman for the Chinese Embassy in Washington said in an email. “We hope that there can be a professional, responsible and evidence-based approach to identifying cyber-related incidents, rather than making allegations based on speculations.”

The report of the breach comes days after Federal Bureau of Investigation Director Christopher Wray warned of Chinese-linked attempts to steal sensitive or valuable data. Speaking Tuesday at the Ronald Reagan Presidential Library, Mr. Wray highlighted last year’s hack of thousands of U.S. companies through certain versions of Microsoft Corp.’s Exchange email client, which is used by many businesses.

“The Chinese government steals staggering volumes of information and causes deep, job-destroying damage across a range of industries—so much so that, as you heard, we’re constantly opening new cases to counter their intelligence operations, about every 12 hours or so,” he said.

The Biden administration has ordered federal agencies to more aggressively vet their vendors and has urged companies to do the same as they shore up their internal defenses. Suppliers are appealing targets because they often have poorly understood connections to other businesses, cybersecurity experts say, raising the possibility that a single hack can wreak widespread havoc.

In December 2020, several federal agencies discovered that a suspected Russian espionage operation broke into their computer systems through a compromised software update from network-management firm SolarWinds Corp. Criminal hackers breached software provider Kaseya Ltd. last summer, exposing hundreds of its clients to potential ransomware attacks. SolarWinds and Kaseya said they worked with U.S. officials and customers to respond to the respective breaches.

Write to David Uberti at david.uberti@wsj.com

Corrections & Amplifications

News Corp said in a securities filing that third-party technology systems used by the company were targeted in a cyber attack. An earlier version of this article incorrectly said hackers entered the company’s computer systems through third-party technology providers.

This story has been published from a wire agency feed without modifications to the text

Subscribe to Mint Newsletters

* Enter a valid email

* Thank you for subscribing to our newsletter.

Never miss a story! Stay connected and informed with Mint. Download our App Now!!

Close

×

Ellis County News Online

© 2021 Ells County News Online

Navigate Site

  • Disclosure
  • Privacy Policy
  • DMCA Policy
  • CCPA
  • Medical Disclaimer

Follow Us

No Result
View All Result
  • Home
  • DMCA Policy
  • Medical Disclaimer
  • Privacy Policy
  • Disclosure
  • CCPA
  • Terms of Use

© 2021 Ells County News Online

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT