Newsweek Joins Growing Club of Possible Russian Cyberattack Targets


Newsweek is the latest media institution to get caught up in a series of cyberattacks that have targeted major government, political and media organizations, raising suspicions of links to Russia or other foreign adversaries.

The news magazine sustained a massive DDoS attack the day after it published a cover story about Republican presidential candidate Donald Trump's business activities in the late 1990s. Officials linked to the real estate mogul allegedly spent tens of thousands of dollars to seek out potential new business in Cuba, amid rumors of a change in U.S. policy during the second term of the Clinton administration.

The expenditures would have violated U.S. law, the article suggests, as it was illegal for Americans to spend money in the country due to a boycott of the Castro regime.

Kurt Eichenwald, author of the Newsweek story, tweeted news of the attack.

Eichenwald later tweeted that numerous IP addresses had been identified, with the main ones coming from Russia.

The New York Times this summer was hit by an attack on its Moscow bureau.

There was no evidence that any of the company's internal systems, including at the Moscow bureau, had been breached or compromised, Eileen Murphy, SVP of communications, said at the time.

The two attacks are different in that hackers breached The New York Times in search of information, while the Newsweek attack was a DDoS, noted Jon Clay, senior global marketing manager at Trend Micro.

"The similarities are that they are both news organizations," he told the E-Commerce Times. "We have seen an increase in attacks against these types of organizations over the past year, which may be due to the nature of the world today. Hackers want information they can use to either sell or exploit for profit, and hacktivists want to disrupt their victims' activities or networks."

DDoS attacks often involve using compromised devices connected to the Internet -- for example, Web cameras or IoT devices -- and then flooding the system with targeted communications from them, said Clay.

"More traditionally, the actors have recruited other sympathetic users on the Internet to utilize DDoS tools and then coordinate an attack at a specified time frame," he pointed out.

DDoS attacks generally fall into three categories -- mischief, misdirection or brand damage -- noted Kevin O'Brien, president of GreatHorn.

Mischief attacks, known as "lulz," are essentially digital graffiti -- or hackers having fun at the expense of a victim, he told the E-Commerce Times. Brand damage is essentially a form of disrupting a political or corporate brand by taking it offline. Misdirection attacks use the initial hack to divert essential IT staff from a second more dangerous attack, which usually involves the use of stolen credentials to access more sensitive areas of a target.

"I would not be surprised to find that the Newsweek DDoS attack was motivated by some form of political activism, in response to their OpEd position in world affairs in general and/or Russian influence on the global stage in particular," O'Brien said.

The jury is still out on whether the Newsweek attack was designed to intimidate the magazine or was a random attack designed primarily to embarrass another major U.S. institution, said Rick Edmonds, media business analyst at the Poynter Institute.

"I'd vote for random mischief, though I am going to have to leave it to the CIA to scope out how coordinated the Russian hacks are and what their purpose is," he told the E-Commerce Times, noting that the Newsweek attack was "sort of in the Trump spirit of bite back."

David Jones is a freelance writer based in Essex County, New Jersey. He has written for Reuters, Bloomberg, Crain's New York Business and The New York Times.

0 Comment

Leave a Reply

Captcha image


  • 5300c769af79e

    Evaluating Endpoint Security Solutions Across the Cyber Kill Chain

    Download The Cyber Kill-Chain is an intelligence-led framework that follows activity against a given organization by persistent threat actors.The kill chain measures the effectiveness of security assets across all types of threats.
  • 5300c769af79e

    Microsoft Open Sources Cognitive Toolkit

    The latest version, available now on GitHub via an open-source license, includes new functionality allowing developers use the Python or C++ programming languages.Aimed at everyone from small startups to major technology companies, Microsoft Cognitive Toolkit could power the next Skype Translator or Cortana digital assistant.
  • 5300c769af79e

    Download Apps For Free: Search results for theme

    ### $pecially designed for ZERO launcher, provide$ delicate app icons,wallpapers,folder and app drawer interface.## If you are rather a mobile enthu$ia$t, $urely you will recognize these elements from our latest theme and don't forget to share with your friends!
  • 5300c769af79e

    Live for the Week of August 14, 2015

    InformationWeek Live for the Week of August 14, 2015 Join us for a roundup of the top stories on InformationWeek.We'll be talking with the InformationWeek.