The Washington Post recently reported that hackers have breached the newspaper's servers and accessed employee user names and encrypted passwords.
Following the breach, all employees were advised to changed their user names and passwords.
The breach was discovered by security firm Mandiant, which said it only lasted for a few days at most, and no other information appears to have been accessed, such as employee credit card data, employee contact information, or the Post's publishing system.
It apparently began with an intrusion into a server used by the newspaper's foreign staff, then spread to other servers.https://o1.qnsr.com/log/p.gif?;n=203;c=204660766;s=9477;x=7936;f=201812281312070;u=j;z=TIMESTAMP;a=20392931;e=i
Although the investigation is still ongoing, the Post reports that it's focusing on the "possibility that Chinese hackers were responsible for the hack." When Infosecurity asked the Syrian Electronic Army if they were involved, they claimed, "No, the SEA wasn't involved in it. We only heard about it in the news."
The breach is at least the third at the Post in as many years. In July 2011, 1.27 million accounts on the Post's employment Web site were compromised; soon after, Chinese hackers compromised at least three servers and several desktops at the newspaper; and in August 2013, a phishing attack by the Syrian Electronic Army compromised a staff writer's Twitter account and redirected some Washington Post articles to the SEA's site.