Welcome!

Web 2.0 Authors: Brian Lavallée, Yeshim Deniz, Roger Strukhoff, Jason Bloomberg, Elizabeth White

Related Topics: iPhone, SOA & WOA, Search, Web 2.0, Open Web, Security

iPhone: Article

Apple Hacked

Facebook last Friday confessed to experiencing the same infestation

Tuesday when a report by American security firm Mandiant that's been six years in the making was circulating tracing an "overwhelming percentage" of Communist China's far-flung corporate and governmental cyber espionage to a 12-story building in Shanghai connected with the People's Liberation Army know as PLA 61398, the usually secure Apple disclosed that its Macs had been hacked and infected with malware by bad guys leveraging the known vulnerabilities that Oracle doesn't seen to be able to eradicate from the Java software used as a browser plug-in.

Facebook last Friday confessed to experiencing the same infestation.

The Apple hack hit a "small number" of internal Macs belonging to Apple developers who visited a developer site purposely infected with malicious code designed specifically to attack Macs.

It also attacked Mac computers at corporate accounts outside the company.

Reuters, which described it as the "highest-profile cyber attack to date on businesses running Mac computers," said it attacked "hundreds of companies including defense contractors."

It is unclear if the Apple and Facebook attacks had anything to do with Building 61398 although there have been reports that the Facebook attack on some laptops on its network traced back to China.

Both companies have denied any data loss. Law enforcement has been called in. When last heard from Apple was working on some repair code. The Mac OS disables Java if it hasn't been used for 35 days.

Meanwhile, besides its 60-page report Mandiant has released a video that's supposed to show actual attacks. The New York Times, which suffered a weeks-long secret attack a couple of weeks ago along with the Wall Street Journal and the Washington Post, ran a big story about the Mandiant report, which concludes that the attacks are government-sponsored and stealing US, Canadian and UK IP.

President Barak Obama just signed an executive order encouraging companies to share confidential information such as hackers' unique signatures with intelligence agencies.

More Stories By Maureen O'Gara

Maureen O'Gara the most read technology reporter for the past 20 years, is the Cloud Computing and Virtualization News Desk editor of SYS-CON Media. She is the publisher of famous "Billygrams" and the editor-in-chief of "Client/Server News" for more than a decade. One of the most respected technology reporters in the business, Maureen can be reached by email at maureen(at)sys-con.com or paperboy(at)g2news.com, and by phone at 516 759-7025. Twitter: @MaureenOGara

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.