Pittsburgh Post-Gazette to cease publication May 3 New York Times lawsuit advances as Pentagon press access faces scrutiny Arab states rank among the world’s toughest for journalists Rights group raises alarm over Pakistan court verdicts Irish media groups warn Garda bill threatens reporter sources Semafor digital news startup raises $30 million NBCUniversal Winter Olympics ad inventory sells out early Media groups hold U.S. town hall on authoritarianism U.S. appeal revives debate on DHS force against journalists Knight-Bagehot Fellowship opens applications for 2026 Pittsburgh Post-Gazette to cease publication May 3 New York Times lawsuit advances as Pentagon press access faces scrutiny Arab states rank among the world’s toughest for journalists Rights group raises alarm over Pakistan court verdicts Irish media groups warn Garda bill threatens reporter sources Semafor digital news startup raises $30 million NBCUniversal Winter Olympics ad inventory sells out early Media groups hold U.S. town hall on authoritarianism U.S. appeal revives debate on DHS force against journalists Knight-Bagehot Fellowship opens applications for 2026
Logo
Janu
Where media reporting began

Chinese hacked NYT computers, says paper

 JournalismPakistan.com |  Published: 31 January 2013

Join our WhatsApp channel

Chinese hacked NYT computers, says paper
Chinese hackers have breached The New York Times' computer systems, targeting information related to a sensitive investigation. The attacks coincided with the newspaper's reporting on the wealth of Premier Wen Jiabao's family.

BEIJING: Chinese hackers repeatedly penetrated the computer systems of The New York Times over the past four months, stealing reporters' passwords and hunting for files on an investigation into the wealth amassed by the family of a top Chinese leader, the newspaper reported Thursday.

Security experts hired to investigate and plug the breach found that the attacks used tactics similar to ones used in previous hacking incidents traced to China, the report said. It said the hackers routed the attacks through computers at U.S. universities, installed a strain of malicious software, or malware, associated with Chinese hackers and initiated the attacks from Chinese university computers previously used by the Chinese military to attack U.S. military contractors.

The attacks, which began in mid-September, coincided with a Times investigation into how the relatives and family of Premier Wen Jiabao built a fortune worth over $2 billion. The report, which was posted online Oct. 25, embarrassed the Communist Party leadership, coming ahead of a fraught transition to new leaders and exposing deep-seated favoritism at a time when many Chinese are upset about a wealth gap.

Over the months of cyber-incursions, the hackers eventually lifted the computer passwords of all Times employees and used them to get into the personal computers of 53 employees.

The report said none of the Times' customer data was compromised and that information about the investigation into the Wen family remained protected, though it left unclear what data or communications the infiltrators accessed. - AP

KEY POINTS:

  • Chinese hackers accessed NYT's systems over four months.
  • They stole passwords and targeted files on Premier Wen Jiabao's family.
  • Attacks used malware linked to previous incidents traced to China.
  • None of NYT's customer data was compromised.
  • The breaches exposed favoritism amid growing inequality concerns in China.

Explore Further

Winners of Journalism Awards announced

Winners of Journalism Awards announced

 September 06, 2013: Columbia University announces the 2023 winners of the Maria Moors Cabot Prize, honoring journalists for their work in the Western Hemisphere.

Journalist Jack Germond dies at age 85

Journalist Jack Germond dies at age 85

 August 15, 2013: Jack Germond, a prominent American political journalist, passed away at age 85, leaving behind a legacy in political coverage and analysis.

NBC sportscaster arrested on DUI

NBC sportscaster arrested on DUI

 April 22, 2013: NBC sportscaster Al Michaels was arrested in Santa Monica for DUI after officers observed illegal driving behavior and signs of intoxication.

Journalist to face judge over sources

Journalist to face judge over sources

 April 10, 2013: A Fox News reporter faces a Colorado judge to determine if she must reveal anonymous sources linked to the 2012 Aurora theater shooting.

Producers pay tribute to late TV host

Producers pay tribute to late TV host

 March 11, 2013: Producers mourn the tragic death of Gregory Rodriguez, host of 'A Rifleman's Journal', who was fatally shot in Montana by a jealous husband.

Newsroom
Pittsburgh Post-Gazette to cease publication May 3

Pittsburgh Post-Gazette to cease publication May 3

 January 08, 2026 Block Communications will close the Pittsburgh Post-Gazette on May 3, 2026, ending its long run after years of financial losses and labor-related legal rulings.


New York Times lawsuit advances as Pentagon press access faces scrutiny

New York Times lawsuit advances as Pentagon press access faces scrutiny

 January 08, 2026 The New York Times is suing the Pentagon over credential rules, saying they violate the First Amendment as March hearing heightens scrutiny of military access.


Arab states rank among the world's toughest for journalists

Arab states rank among the world's toughest for journalists

 January 08, 2026 Arab states remain among the world's most restrictive places for journalists, where censorship, detentions and legal pressures limit independent reporting.


Rights group raises alarm over Pakistan court verdicts

Rights group raises alarm over Pakistan court verdicts

 January 08, 2026 Human Rights Foundation says Pakistani court convicted several journalists in absentia, raising concerns about due process and judicial independence.


Irish media groups warn Garda bill threatens reporter sources

Irish media groups warn Garda bill threatens reporter sources

 January 07, 2026 NewsBrands Ireland says the Garda Síochána (Powers) Bill could weaken journalists' source protections by allowing device seizures and delaying privilege review.


Popular Stories