The Philadelphia Inquirer Newspaper Hacked 

The Philadelphia Inquirer, a major  US newspaper has suffered a large-scale  cyber attack disruption to its operations and rendiering it unable to go to print for the the first time in living memory. 

The company's IT teams along with third-party cyber security experts are working to restore systems after the  attack disrupted operations. The Sunday edition was only available on-line.

With no regular Sunday newspaper and online stories also facing some delays, the cyber attack has triggered the worst disruption to the Inquirer in decades. This attack has been reported to the FBI, and an investigation is on-going.

The attack was first detected when employees found that the newspaper’s content-management system was not working.  

Cyber attacks have become a major threat to media companies, and experts said news organisations can be particularly prized targets because of the nature of their work. Hackers may want to access reporters’ notes and files, for example, or to embarrass a news organisation by leaking emails or Slack messages. Others may want to publish misinformation through real news organisations’ platforms or simply to wreak havoc in a highly visible way. 

News organisations are increasingly being targeted by sophisticated threat actors, as have government agencies, hospitals, universities and the business sector.

Few details about the attack on the Inquirer have been released to staff members or readers. It is unclear whether any personal data has been exposed, exactly which systems had been breached, or who was behind the attack and what motivations they had.

Inquirer:    NBC:    NYPost:    LA Times:   Marketwatch:   CTPost:     Guardian

You Might Also Read: 

Guardian Newspaper Suffers A Large Scale Ransomware Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« Breach Will Cost Capita At Least £20m
ABB Struck By Black Basta Ransomware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

VNCERT

VNCERT

VNCERT is the national Computer Emergency Response Team for Vietnam.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Egyptian Supreme Cybersecurity Council (ESCC)

Egyptian Supreme Cybersecurity Council (ESCC)

ESCC is responsible for developing a national strategy to face and respond to the cyber threats and attacks and to oversee its implementation and update.

Verafin

Verafin

Verafin is one of the North American leaders in fraud detection and AML software.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

Tide Foundation

Tide Foundation

Tide's breakthrough multi-party-cryptography enables TRUE-zero-trust technology that unlocks cyber-herd immunity.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.