Hackers May Have Gained Mil Times Subscriber Info

So U.S. newspaper giant Gannett’s goverment media division was the victim of a cyber attack earlier this month in which subscribers info was apparently accessed.

Given the fact that Gannett Government Media publishes Defense News, Armed Forces Journal, C4ISR Journal, Training and Simulation Journal, Federal Times and the Military Times family of papers, the hackers may have gained access to some senior government officials information.

No word yet on who may be behind the attack.

From Reuters:

  Hackers broke into a Gannett Co database containing
  personal information about subscribers to publications read by U.S.
  government officials, military leaders and rank-and-file soldiers, the media
  company said on Tuesday.

  Gannett told subscribers via email that it discovered the breach of its_
  Gannett Government Media Corp_ on June 7. It said it had previously notified
  subscribers of the breach via a notice on its website.

Here’s that June 7, Gannett announcement titled, A Message to Readers:

The Military Times family of websites suffered a cyber attack Tuesday. Affected were MilitaryTimes.com, Army Times.com, NavyTimes.com, Air ForceTimes.com, MarineCorpsTimes.com, and sister site DefenseNews.com.

Some users were unable to access parts or all of the websites. The problems have now been resolved and an investigation remains underway.

  • Former Timeser

    Ah, we former Timesers always complained about the lousy IT system. The standard practice was to keep a hotmail account as secondary email when the system choked - as it did periodically as deadlines approached.

    No big surprise their security was crap; last time I checked, their generic AOHell account was still active!

    Tobias must be going nutz. LOL

  • hal cook

    if there is nothing classified, does it matter? NO.

  • Inf E7

    FOR hal cook - Other than the possibility that the hackers captured your user name and password what concern could there be? . . .

  • Former Timeser

    PII - Personally Identifiable Information that can be used for Identity Theft.
    Subscriber info almost certainly included the credit card used to pay for it.

  • Brady

    Why on earth were they storing users’ passwords unencrypted in the database?
    Honestly, what other explanation is there other than laziness or incompetence?