Incident: Antivirus Software Failure in New York Times Cyberattack.

Published Date: 2013-01-31

Postmortem Analysis
Timeline 1. The software failure incident happened during a four-month long cyberattack on the New York Times by Chinese hackers [16412]. Therefore, the estimated timeline of the software failure incident would be from September 2012 to January 2013.
System 1. Symantec antivirus software [16412]
Responsible Organization 1. Chinese hackers targeted the New York Times' network and installed custom malware that bypassed the Symantec antivirus software [Article 16412].
Impacted Organization 1. The New York Times company was impacted by the software failure incident as their antivirus software missed the majority of the malware installed by Chinese hackers on their network [16412].
Software Causes 1. The failure incident was caused by the New York Times' antivirus software from Symantec missing 44 out of 45 pieces of malware installed by Chinese hackers on the network [16412].
Non-software Causes 1. Lack of awareness about every program running on the network [16412] 2. Insufficient monitoring of network activity [16412] 3. Failure to anticipate and adequately prepare for targeted attacks [16412]
Impacts 1. The antivirus software used by the New York Times missed 44 out of 45 pieces of malware installed by Chinese hackers during a cyberattack, leading to a significant security breach [Article 16412]. 2. The failure of the antivirus software allowed the attackers to retrieve usernames and passwords of Times' reporters, compromising sensitive information [Article 16412]. 3. The incident highlighted the limitations of relying solely on antivirus software for cybersecurity, emphasizing the need for more advanced security solutions to combat sophisticated cyber threats [Article 16412]. 4. The software failure incident demonstrated that even modern antivirus software may not provide sufficient protection against determined attackers, urging companies, countries, and consumers to enhance their security measures [Article 16412]. 5. The failure of the antivirus software prompted the New York Times to seek external assistance from AT&T and security consultancy Mandiant to monitor and track the attackers' movements through its systems [Article 16412].
Preventions 1. Implementing more advanced security solutions beyond traditional antivirus software, as highlighted by Symantec [16412]. 2. Deploying technology that closely monitors network activity to detect and alert on suspicious behavior, as recommended by security experts [16412]. 3. Conducting thorough monitoring of all programs running on the network to enhance awareness and security, as emphasized by security consultancy Immunity [16412]. 4. Utilizing a combination of security measures rather than relying solely on antivirus software, as suggested by Avast [16412].
Fixes 1. Implement more advanced security solutions beyond traditional antivirus software to combat sophisticated cyber threats [16412]. 2. Deploy technology that closely monitors network activity to detect and respond to intrusions promptly [16412]. 3. Enhance awareness and understanding of all programs running on the network to improve security posture [16412]. 4. Utilize a combination of security measures rather than relying solely on antivirus software, such as setting up tripwires to alert of potential breaches [16412].
References 1. Dave Aitel, CEO of security consultancy Immunity [Article 16412] 2. Symantec (SYMC) [Article 16412] 3. Rohit Sethi, head of product development for SD Elements [Article 16412] 4. Michael Higgins, the New York Times' chief security officer [Article 16412] 5. Nicole Perlroth, Times reporter [Article 16412] 6. Avast, antivirus software maker [Article 16412] 7. Jindrich Kubec, Avast's threat intelligence director [Article 16412]

Software Taxonomy of Faults

Category Option Rationale
Recurring unknown The articles do not provide information about a similar software failure incident happening again at the same organization or at multiple organizations. Therefore, the specific incidents mentioned in the articles are unique and not explicitly linked to any recurring patterns within the same organization or across multiple organizations.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. The New York Times' antivirus software, provided by Symantec, missed 44 out of 45 pieces of malware installed by Chinese hackers during a cyberattack. The reason for this failure was that the hackers built custom malware that was not on Symantec's list of forbidden software, allowing most of it to pass through undetected [16412]. (b) The software failure incident related to the operation phase is also highlighted in the article. The New York Times suspected an attack due to its investigation into Chinese Prime Minister Wen Jiabao's family finances and asked AT&T to monitor its network. AT&T quickly picked up suspicious signs, indicating that the operation and monitoring of the network played a crucial role in detecting the cyberattack [16412].
Boundary (Internal/External) within_system, outside_system The software failure incident reported in the articles can be categorized as both within_system and outside_system: (a) within_system: The failure within the system can be attributed to the limitations of the antivirus software deployed by the New York Times. The antivirus software from Symantec missed 44 out of 45 pieces of malware installed by Chinese hackers on the network, indicating a failure within the system's defense mechanisms [16412]. (b) outside_system: The failure outside the system can be attributed to the sophisticated and custom malware developed by the Chinese hackers to bypass the antivirus software. The attackers built custom malware that was not on Symantec's list of forbidden software, allowing most of it to pass through undetected. This external factor contributed to the software failure incident [16412].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the New York Times cyberattack was primarily due to non-human actions. The antivirus software from Symantec missed detecting 44 out of 45 pieces of malware installed by Chinese hackers on the network [16412]. This failure was attributed to the custom-built malware that was not on Symantec's list of forbidden software, allowing it to pass through undetected. The incident highlighted the limitations of relying solely on antivirus software for protection against sophisticated cyber threats. (b) Human actions also played a role in the software failure incident. The attackers targeted individuals within the New York Times by sending malicious code through email accounts, exploiting human behavior to gain access to the network [16412]. Additionally, the response to the incident involved human actions such as requesting AT&T to monitor the network, hiring security consultancy Mandiant to track the attackers, and making decisions based on suspicions and observations made by security personnel within the company.
Dimension (Hardware/Software) software (a) The software failure incident related to hardware: - The incident mentioned in the article is primarily focused on a cyberattack by Chinese hackers on the New York Times' network. The failure of the antivirus software to detect the custom malware installed by the attackers was a significant issue. This failure was not directly attributed to hardware issues but rather to the limitations of the antivirus software in detecting sophisticated attacks [16412]. (b) The software failure incident related to software: - The software failure incident in this case is attributed to the limitations of the antivirus software deployed by the New York Times. The software failed to detect the custom malware created by the Chinese hackers, highlighting a software-related failure in terms of effectiveness and capability [16412].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident reported in the articles is malicious in nature. Chinese hackers conducted a cyberattack on the New York Times, installing custom malware to retrieve usernames and passwords of Times' reporters [16412]. The attackers bypassed the antivirus software deployed by the New York Times, indicating a deliberate attempt to harm the system and steal sensitive information. Additionally, the incident involved sophisticated attacks that were specifically targeted at the Times due to its investigative reporting on Chinese Prime Minister Wen Jiabao's family finances, further highlighting the malicious intent behind the software failure incident.
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions The software failure incident reported in the articles can be attributed to both poor decisions and accidental decisions: (a) poor_decisions: The incident highlights poor decisions related to relying solely on antivirus software for protection against sophisticated cyberattacks. The New York Times' use of Symantec's antivirus software failed to detect custom malware created by Chinese hackers, leading to a significant security breach [16412]. (b) accidental_decisions: The incident also points to accidental decisions or unintended consequences, such as the oversight of not having a comprehensive security strategy beyond antivirus software. The attackers exploited vulnerabilities in the system by sending malicious code through emails, highlighting the need for a more holistic approach to cybersecurity [16412].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the article. The incident at the New York Times, where Chinese hackers successfully infiltrated the network despite the antivirus software in place, highlights a failure due to contributing factors introduced due to the lack of professional competence by the development organization. The antivirus software from Symantec missed 44 out of 45 pieces of malware installed by the attackers, primarily because the hackers built custom malware that was not on Symantec's list of forbidden software, allowing it to pass through undetected [16412]. (b) The software failure incident related to accidental factors is also apparent in the article. The incident at the New York Times showcases how the attackers were able to exploit vulnerabilities and infiltrate the network by sending malicious code through email, which individuals unknowingly opened, allowing the attackers access. This accidental action of opening the malicious email contributed to the success of the cyberattack [16412].
Duration temporary The software failure incident reported in the articles can be categorized as a temporary failure. The incident was a result of specific circumstances, such as the cyberattack by Chinese hackers on the New York Times' network, where the antivirus software missed the majority of the malware installed by the attackers [16412]. This failure was not a permanent issue but rather a temporary one caused by the specific attack and the limitations of the antivirus software in detecting the custom-built malware used by the hackers.
Behaviour omission, other (a) crash: The software failure incident reported in the articles does not involve a crash where the system loses state and does not perform any of its intended functions. The failure was related to the antivirus software missing malware installed by attackers on the New York Times network [Article 16412]. (b) omission: The software failure incident can be categorized as an omission where the antivirus software omitted to detect 44 out of 45 pieces of malware installed by Chinese hackers on the New York Times network. The custom malware created by the hackers was not on the list of forbidden software in the Symantec antivirus system, leading to the omission of detection [Article 16412]. (c) timing: The software failure incident is not related to timing issues where the system performs its intended functions correctly but too late or too early. The focus of the incident was on the antivirus software's inability to detect the malware promptly [Article 16412]. (d) value: The software failure incident does not involve a failure due to the system performing its intended functions incorrectly. The issue was primarily about the antivirus software's effectiveness in detecting custom malware created by attackers [Article 16412]. (e) byzantine: The software failure incident does not exhibit a byzantine behavior where the system behaves erroneously with inconsistent responses and interactions. The failure was more about the limitations of traditional antivirus software in detecting sophisticated cyber threats [Article 16412]. (f) other: The software failure incident can be categorized as a failure due to the system's inability to keep up with evolving cyber threats and the attackers' ability to create custom malware that bypassed traditional antivirus software defenses [Article 16412].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident at the New York Times, where Chinese hackers successfully infiltrated the network despite the antivirus software in place, resulted in the compromise of sensitive information. The attackers managed to install custom malware that allowed them to retrieve the usernames and passwords of Times' reporters. This breach of security led to a significant impact on the property in the form of compromised data [16412].
Domain information, finance (a) The failed system was intended to support the information industry. The New York Times, a prominent news organization, was the target of a cyberattack by Chinese hackers. The hackers aimed to retrieve usernames and passwords of Times' reporters, indicating that the incident directly impacted the production and distribution of information [Article 16412]. (h) Additionally, the incident involved the finance industry indirectly. The attackers targeted the New York Times due to its investigation into Chinese Prime Minister Wen Jiabao's family finances. This connection highlights the intersection of the information and finance industries in this software failure incident [Article 16412]. (m) The incident also has implications for the cybersecurity industry. The failure of the antivirus software to detect the custom malware used by the hackers underscores the challenges faced by security solutions in effectively combating sophisticated cyber threats. This failure highlights the need for continuous advancements in cybersecurity technologies to protect against evolving attack methods [Article 16412].

Sources

Back to List