Thursday, May 15, 2025
HomeCyber AttackMedia Gaint News Corp Says Hackers Had Access to Network for Two...

Media Gaint News Corp Says Hackers Had Access to Network for Two Years

Published on

SIEM as a Service

Follow Us on Google News

On January 20, 2022, News Corp identified cyberattacks on a business email and document storage system utilized by numerous News Corp businesses.

According to the inquiry, News Corp has learned that, between February 2020 and January 2022, a third party illegally acquired access to some business documents and emails from a small number of its employees’ accounts in the compromised system. Some of these emails contained personal data.

“Our investigation indicates that this activity does not appear to be focused on exploiting personal information”, News Corp reports.

- Advertisement - Google News

Research suggests that this activity doesn’t seem to be focused on utilizing personal data. The Wall Street Journal, the New York Post, and the publishing company’s news activities in the UK were all impacted by the incident.

“We are not aware of reports of identity theft or fraud in connection with this issue. We nonetheless are providing you notice of this issue because the investigation has determined that some of your personal information was contained in the relevant materials”, News Corp.

What Details Were Involved?

Your name, date of birth, Social Security number, license number, passport number, financial account information, medical information, and health insurance information might have been among the personal data that was compromised.

“As soon as we became aware of the activity, we notified U.S. law enforcement and launched an investigation with the assistance of a leading cybersecurity firm”, says the company.

“We have no evidence of ongoing unauthorized access to our systems. We take our obligation to safeguard personal information very seriously and are alerting you about this issue so you can take steps to help protect yourself”.

For a period of 24 months, the company provides free identity protection and credit monitoring services through Experian. So it advises you to sign up for the free credit monitoring service.

The New York Post, The Wall Street Journal, Dow Jones, MarketWatch, Fox News, Barron’s, The Sun, and the News UK British daily publisher are just a few of the properties owned by News Corp.

Also, the media giant said that the attackers are connected to a “foreign government” and that they exfiltrated some data while they had access to its systems when it initially revealed this security incident last year.

Network Security Checklist – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...