The Los Angeles Times says an unusual cyberattack that disrupted its printing operations and those at newspapers in San Diego and Florida over the weekend came from outside the United States, but it stopped short of accusing a specific foreign government.
Computer malware attacks on infrastructure, while relatively rare, are hardly new: Russia has been credibly accused of shutting down power grids in Ukraine and a petrochemical plant in Saudi Arabia, Iran crippled a casino in Las Vegas, and the United States and Israel attacked a nuclear enrichment plant in Iran. But this would be the first known attack on major newspaper printing operations, and if politically motivated, it would define new territory in recent attacks on the media.
The malware was focused on the networks used by Tribune Publishing, which until recently owned The Los Angeles Times and The San Diego Union-Tribune. The two papers still share their former parent company’s printing networks.
The Los Angeles Times said the attack also affected the Saturday distribution of The New York Times and The Wall Street Journal, which share use of a large printing plant in Los Angeles for their West Coast editions. Both appear to have been collateral damage; there was no evidence that they were hit by the same malware aimed at the Tribune company.
The online editions of the news organizations were not affected, and Tribune Publishing said no data about its subscribers was compromised.
“Every market across the company was impacted,” Marisa Kollias, a spokeswoman for Tribune Publishing, told The Los Angeles Times. The Tribune’s remaining publications include its flagship, The Chicago Tribune, and newspapers in Florida, Hartford and Maryland. It also owns The Daily News in New York.
Missing from Tribune’s statements were any details about the nature of the malware or evidence for its assertion that the attack originated overseas. Anonymous sources cited by The Los Angeles Times suggested that the malware may have been a form of ransomware — a pernicious attack that scrambles computer programs and files before demanding that the victim pay a ransom to unscramble them.
Click here to read more.
SOURCE: NY Times, David E. Sanger and Nicole Perlroth