Anatomy of a Breach

Anatomy of a Breach: The New York Times — Four Months of Chinese Espionage Targeting Journalists

> series: anatomy_of_a_breach —— part: 049 —— target: new_york_times —— attacker: apt1_unit_61398 —— duration: 4_months<span class="cursor-blink">_</span>_

Hedgehog Security 31 January 2013 13 min read

China did not want this story published. So they hacked the newspaper.

On 30 January 2013, the New York Times disclosed that Chinese hackers had infiltrated its computer network and maintained access for approximately four months. The attackers specifically targeted the email accounts and passwords of reporters who had been investigating the personal wealth of the family of Wen Jiabao, then-Premier of China. The investigation, which documented how Wen's relatives had accumulated billions of dollars in assets, was published in October 2012 — and the cyber intrusion began around the same time, suggesting the attackers were seeking to identify the Times' sources within China.

Security firm Mandiant, hired by the Times to investigate, traced the attacks to the same Chinese military unit — the People's Liberation Army Unit 61398, also known as APT1 — that had been linked to Operation Aurora and Nortel's decade-long compromise. The attackers installed 45 pieces of custom malware on Times systems, none of which were detected by the newspaper's Symantec anti-virus software. Mandiant would publish its landmark APT1 report the following month, publicly identifying Unit 61398 and documenting its campaigns against 141 organisations across 20 industries.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Spear-phishing, custom malware, and anti-virus evasion.

NYT Breach — Kill Chain
── Initial Access ──────────────────────────────────────────
Spear-phishing emails targeting Times employees
Malware deployed — 45 custom samples installed
Zero detections by Symantec anti-virus

── Lateral Movement ────────────────────────────────────────
Passwords of every Times employee cracked
External access gained to 53 employee computers
Specific targeting of China bureau reporters

── Objective ───────────────────────────────────────────────
Identify confidential sources for Wen Jiabao investigation
Monitor email communications of China correspondents
No evidence of intellectual property theft
Objective was intelligence, not data theft

Nation-state targeting extends beyond defence and technology.

The Times breach expanded the known target set for Chinese state-sponsored espionage. Previous campaigns — Aurora, Shady RAT, Nortel — had targeted technology companies, defence contractors, and international organisations. The Times breach showed that any organisation whose activities intersect with a foreign government's political sensitivities can become a target. Media organisations, NGOs, law firms handling cross-border disputes, and professional services firms advising on international transactions all fall within this expanded threat model.

Media as a Target
The Times was targeted because of its journalism — specifically, investigative reporting that embarrassed the Chinese government. Any media organisation, law firm, or consultancy whose work touches politically sensitive topics faces the same risk. Our <a href="/blog/sector-under-the-microscope-professional-services">professional services analysis</a> examines this cross-sector threat.
Anti-Virus Failed Completely
45 custom malware samples, zero anti-virus detections. The attackers tested their malware against AV products before deployment — the same technique <a href="/blog/anatomy-of-a-breach-gonzalez-indictment">Gonzalez</a> and <a href="/blog/anatomy-of-a-breach-mariposa-botnet">Mariposa</a> used. Signature-based AV is necessary but insufficient. <a href="https://www.socinabox.co.uk">SOC in a Box</a> uses behavioural detection alongside signatures to catch the malware that AV misses.
Source Protection Is a Security Issue
The attackers' objective was to identify the Times' confidential sources — people inside China who had provided information about Wen Jiabao's family wealth. If those sources were identified, the consequences could include imprisonment or worse. Source protection is not just an editorial concern — it is a security concern that requires technical controls.
Detection Required External Help
The Times detected unusual activity but required Mandiant's expertise to investigate and remediate. Mandiant's subsequent <a href="/blog/apt1-the-persistent-data-hoarder">APT1 report</a> publicly attributed the attacks to Unit 61398 — a watershed moment in threat intelligence. For <a href="https://www.cyber-defence.io/services/threat-intelligence">threat intelligence</a> and <a href="https://www.cyber-defence.io/services/incident-response">incident response</a>, UK Cyber Defence provides the expertise organisations need when sophisticated intrusions are detected.

Protecting against targeted nation-state espionage.

The Times breach reinforces the need for defence-in-depth against APT-level threats. Our red team engagements simulate APT techniques including custom malware, AV evasion, and targeted phishing. Social engineering assessments test staff resilience. SOC in a Box provides 24/7 behavioural monitoring that catches the lateral movement and data access patterns that define APT intrusions. Cyber Essentials establishes baseline controls. And UK Cyber Defence provides the incident response and forensic investigation capability when an intrusion is detected.


If China hacked the New York Times over a story, what would they do to access your clients' data?

Our <a href="/penetration-testing/red-team">red team engagements</a> simulate APT-level attacks. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects what AV misses. Because nation-state targeting is no longer limited to defence contractors.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles