Symantec denies blame in New York Times hack
By Stewart Mitchell
Posted on 31 Jan 2013 at 10:42
Security company Symantec has blamed The New York Times for not installing and configuring its software properly after Chinese hackers infiltrated the paper's computer systems.
The accusation follows a rare public disclosure from a hacked company, with The Times pointing the finger at Symantec for not spotting the attack from Chinese hackers that obtained editorial passwords.
In an in-depth review of the hack, how it took place and the fall out, The Times took the unusual step of naming its security supplier, and made no bones about the lack of effectiveness of the suite it had deployed.
Over the course of three months, attackers installed 45 pieces of custom malware
"Over the course of three months, attackers installed 45 pieces of custom malware," the paper said. "The Times — which uses antivirus products made by Symantec — found only one instance in which Symantec identified an attacker’s software as malicious and quarantined it, according to Mandiant, [the company used to clean up and investigate the hack]."
The revelation drew a quick response from Symantec, which appeared to claim The Times hadn't turned on all the options available in the software.
"Advanced attacks like the ones the New York Times described underscore how important it is for companies, countries and consumers to make sure they are using the full capability of security solutions," Symantec said in a statement.
"The advanced capabilities in our endpoint offerings, including our unique reputation-based technology and behaviour-based blocking, specifically target sophisticated attacks," the company claimed.
"Turning on only the signature-based anti-virus components of endpoint solutions alone are not enough in a world that is changing daily from attacks and threats," it added. "We encourage customers to be very aggressive in deploying solutions that offer a combined approach to security. Anti-virus software alone is not enough."
According to The Times, the hackers stole passwords for every employee, taking particular interest in staff linked to stories on China and its senior politicians.
Is your business a social business? For helpful info and tips visit our hub.
- 20 years of PC Pro: our greatest review mistakes
- 20 years of PC Pro: our first A-List
- Wikipedia's "right to be forgotten" protest hits the wrong note
- 3D printing hits the high street for plastic selfies
- 20 years of PC Pro: What amazed us in our first issue
- How Google Glass ruined my lunch hour
- Smartphone battery packs: can a USB power pack beat the festival battery blues?
- Windows Easy Transfer – not so "easy" in Windows 8.1
- Formula 1: what a difference virtualisation makes
- Office of the future: comfy chairs and tablets everywhere
- How to write your company's IT security policy
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords