SHARE
Facebook X Pinterest WhatsApp

More Media Outlets Allege Chinese Hacking Attempts

One day after The New York Times announced it had been attacked by Chinese hackers, other media outlets have come forward to say they too were attacked. The Wall Street Journal, Bloomberg and Reuters have all been named as additional targets of cyberattacks that appear to have originated in China. The Wall Street Journal’s Siobhan […]

Feb 1, 2013
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

One day after The New York Times announced it had been attacked by Chinese hackers, other media outlets have come forward to say they too were attacked. The Wall Street Journal, Bloomberg and Reuters have all been named as additional targets of cyberattacks that appear to have originated in China.

The Wall Street Journal’s Siobhan Gorman, Devlin Barrett and Danny Yadron reported, “Chinese hackers believed to have government links have been conducting wide-ranging electronic surveillance of media companies including The Wall Street Journal, apparently to spy on reporters covering China and other issues, people familiar with the incidents said. Journal publisher Dow Jones & Co. said Thursday that the paper’s computer systems had been infiltrated by Chinese hackers, apparently to monitor its China coverage.” They added, “Bloomberg LP on Thursday said attempts had been made to infiltrate its systems but that its security wasn’t breached. A spokeswoman for Thomson Reuters PLC said its Reuters news service was hacked twice in August. She said Reuters couldn’t confirm the hacking source.”

Robert Lemos with eWeek noted, “Hackers have frequently targeted media companies. A decade ago, hacktivists in China and the U.S. defaced the Website of the Cable News Network (CNN), angered over a U.S. spy plane that collided with a Chinese fighter jet. In 2011, hackers affiliated with Anonymous stole user and credit card information from global intelligence firm Stratfor. However, going after sources is a fairly new development. Chinese hackers appear to have targeted stolen emails, contacts and files from more than 30 journalists and executives at Western news organizations, according to a Mandiant report cited by The Times.”

CNN quoted Thomas Parenty, a former employee of the U.S. National Security Agency, who said, “To do a spear-phishing attack of this kind is a well-established move in attacks against Google and various U.S. defense contractors from China.” He added, “You could say the tools are sort of stock-in-trade” for Chinese hackers.

The Guardian’s Charles Arthur commented, “Is there an answer? Unfortunately, no. All you can say is that the more visible the hacker, the less – generally – you have to worry about. Being hacked by Anonymous and having company data (usually usernames and hashed passwords) sprayed around the web is uncomfortable, but it won’t usually destroy your business. The risk from state hackers is far greater – because they can effectively be standing over your shoulder (or under your keyboard), watching everything without you having the least idea it’s happening.”

  SEE ALL
ARTICLES
 
CH

Cynthia Harvey is a freelance writer and editor based in the Detroit area. She has been covering the technology industry for more than fifteen years.

Recommended for you...

What Is Sentiment Analysis? Essential Guide
11 Top Data Collection Trends Emerging In 2024
Kaye Timonera
Feb 8, 2024
6 Top Data Classification Trends
Avya Chaudhary
Oct 13, 2023
7 Data Management Trends: The Future of Data Management
Mary Shacklett
Aug 2, 2023
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.