> series: anatomy_of_a_breach —— part: 049 —— target: new_york_times —— attacker: apt1_unit_61398 —— duration: 4_months<span class="cursor-blink">_</span>_
On 30 January 2013, the New York Times disclosed that Chinese hackers had infiltrated its computer network and maintained access for approximately four months. The attackers specifically targeted the email accounts and passwords of reporters who had been investigating the personal wealth of the family of Wen Jiabao, then-Premier of China. The investigation, which documented how Wen's relatives had accumulated billions of dollars in assets, was published in October 2012 — and the cyber intrusion began around the same time, suggesting the attackers were seeking to identify the Times' sources within China.
Security firm Mandiant, hired by the Times to investigate, traced the attacks to the same Chinese military unit — the People's Liberation Army Unit 61398, also known as APT1 — that had been linked to Operation Aurora and Nortel's decade-long compromise. The attackers installed 45 pieces of custom malware on Times systems, none of which were detected by the newspaper's Symantec anti-virus software. Mandiant would publish its landmark APT1 report the following month, publicly identifying Unit 61398 and documenting its campaigns against 141 organisations across 20 industries.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Times breach expanded the known target set for Chinese state-sponsored espionage. Previous campaigns — Aurora, Shady RAT, Nortel — had targeted technology companies, defence contractors, and international organisations. The Times breach showed that any organisation whose activities intersect with a foreign government's political sensitivities can become a target. Media organisations, NGOs, law firms handling cross-border disputes, and professional services firms advising on international transactions all fall within this expanded threat model.
The Times breach reinforces the need for defence-in-depth against APT-level threats. Our red team engagements simulate APT techniques including custom malware, AV evasion, and targeted phishing. Social engineering assessments test staff resilience. SOC in a Box provides 24/7 behavioural monitoring that catches the lateral movement and data access patterns that define APT intrusions. Cyber Essentials establishes baseline controls. And UK Cyber Defence provides the incident response and forensic investigation capability when an intrusion is detected.
Our <a href="/penetration-testing/red-team">red team engagements</a> simulate APT-level attacks. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects what AV misses. Because nation-state targeting is no longer limited to defence contractors.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call