"Getting the websites back up and running safely for
all users has been our top priority," said Joel Oxley, Senior Vice
President and General Manager of WTOP and Federal News Radio. "We take our
users' privacy very seriously, and we have taken steps to prevent similar
occurrences. We apologize to our user community for any inconvenience that this
incident has caused."
WTOP.com and FederalNewsRadio.com were victims of
cyberattacks last week. When the attacks were discovered, an investigation was
launched immediately, the malicious code was removed, additional security
measures were installed, and federal law enforcement officials were notified of
the incident.
Access to the websites from Internet Explorer web browsers
was blocked to allow for a careful examination of how site security was
compromised and after the initial review, which suggested the hackers may have
targeted Internet Explorer users.
Full access to the websites was restored on Saturday
evening, May 11, 2013, after a review of site security and implementation of
recommendations to fix the vulnerabilities the attacker exploited to gain
access to the websites. The review was conducted and recommendations were made
by Mandiant, an internationally recognized cybersecurity consulting firm.
"We have found and eliminated the vulnerabilities that
were exploited," said John Spaulding, the Washington , D.C.
Director of Information Systems for Hubbard Radio, the parent company of WTOP
and Federal News Radio.
Computers infected with the malware may display a pop-up
message indicating that the computer is infected with a virus. This pop-up
message may be fake if it prompts the user to click on a link, which takes them
to a website that is not recognized by the user. This fake website offers
security software for sale and prompts users to provide personal information,
including credit card numbers. Users should not provide information, if
prompted to do so.
Computers with up-to-date anti-virus programs and security
software should identify the malware and provide instructions on how to delete
or quarantine it.
No comments:
Post a Comment