SlideShare una empresa de Scribd logo
1 de 7
New York Times Hacking Incident



            Max Miller
            3/11/2013
Background
●   Times reporting on Chinese PM's family's
    business dealings: 10/25/2012
●   Corruption, billions of dollars
●   Access to story immediately blocked in China
The Hack
●   Tactics identified with Chinese military hackers
●   Entered via computer networks at American
    universities (used in the past)
●   Stole employee passwords, gained entry to
    personal computers
●   Only seemed to be looking for information
    related to reporting on the story
Growing Threat
●   Expanding campaign against American media,
    corporations, and government entities
●   About image and stealing trade secrets
●   Not only country: US, Israel, Russia, and Iran
    are leaders in developing cyberwarfare
Dealing With the Attack
●   FBI contacted, worked with AT&T to expel the
    attackers
●   Evident not working: Mandiant consultants
    hired
●   Allowed hackers to persist in system,
    monitored for 4 months
●   Closed all “back doors” once patterns were
    detected
Guardian's Lessons
●   Tiers to hackers:
        –   Amateurs: “Anonymous”
        –   Commercial: Hack to make money
        –   Government/Military
Guardian's Lessons
●   Answers: No.
●   More visible the hacker, less to worry about

Más contenido relacionado

Similar a Final Presentation

SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesJohn Bambenek
 
Secrets and Lies The Rise of Corporate Espionage in a Global Economy
Secrets and Lies The Rise of Corporate Espionage in a Global EconomySecrets and Lies The Rise of Corporate Espionage in a Global Economy
Secrets and Lies The Rise of Corporate Espionage in a Global EconomyErrol A. Adams, J.D., M.L.S.
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinFecomercioSP
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threatsisc2dfw
 
Presentación3
Presentación3Presentación3
Presentación3Mikecdr
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...VogelDenise
 
The devil is in the details
The devil is in the detailsThe devil is in the details
The devil is in the detailsCarola Frediani
 
A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo
A Place to Hang Our Hats: Security Community and Culture by Domenic RizzoloA Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo
A Place to Hang Our Hats: Security Community and Culture by Domenic RizzoloDuo Security
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Planbfuesz
 
Social Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxSocial Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxDaniel Gorita
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)Neeraj Mahajan
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 

Similar a Final Presentation (14)

SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
Secrets and Lies The Rise of Corporate Espionage in a Global Economy
Secrets and Lies The Rise of Corporate Espionage in a Global EconomySecrets and Lies The Rise of Corporate Espionage in a Global Economy
Secrets and Lies The Rise of Corporate Espionage in a Global Economy
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
Presentación3
Presentación3Presentación3
Presentación3
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
 
The devil is in the details
The devil is in the detailsThe devil is in the details
The devil is in the details
 
A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo
A Place to Hang Our Hats: Security Community and Culture by Domenic RizzoloA Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo
A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Plan
 
Social Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxSocial Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptx
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 

Final Presentation

  • 1. New York Times Hacking Incident Max Miller 3/11/2013
  • 2. Background ● Times reporting on Chinese PM's family's business dealings: 10/25/2012 ● Corruption, billions of dollars ● Access to story immediately blocked in China
  • 3. The Hack ● Tactics identified with Chinese military hackers ● Entered via computer networks at American universities (used in the past) ● Stole employee passwords, gained entry to personal computers ● Only seemed to be looking for information related to reporting on the story
  • 4. Growing Threat ● Expanding campaign against American media, corporations, and government entities ● About image and stealing trade secrets ● Not only country: US, Israel, Russia, and Iran are leaders in developing cyberwarfare
  • 5. Dealing With the Attack ● FBI contacted, worked with AT&T to expel the attackers ● Evident not working: Mandiant consultants hired ● Allowed hackers to persist in system, monitored for 4 months ● Closed all “back doors” once patterns were detected
  • 6. Guardian's Lessons ● Tiers to hackers: – Amateurs: “Anonymous” – Commercial: Hack to make money – Government/Military
  • 7. Guardian's Lessons ● Answers: No. ● More visible the hacker, less to worry about