{
	"id": "ff69dc01-b425-4a07-a6b2-144714ded50c",
	"created_at": "2026-04-06T00:21:33.097456Z",
	"updated_at": "2026-04-10T13:12:26.709125Z",
	"deleted_at": null,
	"sha1_hash": "533738a54a1657d0badf2a0a87edf78618d19cc9",
	"title": "News Corp discloses hack from \"persistent\" nation state cyber attacks",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 867931,
	"plain_text": "News Corp discloses hack from \"persistent\" nation state cyber attacks\r\nBy Ax Sharma\r\nPublished: 2022-02-04 · Archived: 2026-04-05 17:53:01 UTC\r\nImage: News Corp/BleepingComputer\r\nAmerican media and publishing giant News Corp has disclosed today that it was the target of a \"persistent\" cyberattack.\r\nThe attack discovered sometime this January, reportedly allowed threat actors to access emails and documents of some\r\nNews Corp employees, including journalists.\r\nhttps://www.bleepingcomputer.com/news/security/news-corp-discloses-hack-from-persistent-nation-state-cyber-attacks/\r\nPage 1 of 4\n\nhttps://www.bleepingcomputer.com/news/security/news-corp-discloses-hack-from-persistent-nation-state-cyber-attacks/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nNews Corp's major properties include Fox News, The Wall Street Journal, New York Post, and News UK.\r\nHack disclosed via securities filing\r\nIn a Securities \u0026 Exchange Commission (SEC) filing seen by BleepingComputer today, News Corp shared that one of its\r\nsystems had been subject to \"persistent cyberattack activity.\"\r\nThe attack was discovered this January but it isn't until today that the news conglomerate has publicly disclosed the attack,\r\nalbeit quietly via a filing rather than a data breach notice.\r\nPreliminary findings indicate the attackers are associated with a \"foreign government\" and that some data exfiltration did\r\noccur.\r\nAlthough there is no indication so far of customer or financial data held by the company being affected, News Corp has\r\nengaged an external cybersecurity company, Mandiant, to assist with the investigation.\r\n\"In January 2022, the Company discovered that one of these systems was the target of persistent cyberattack activity.\r\nTogether with an outside cybersecurity firm, the Company is conducting an investigation into the circumstances of the\r\nactivity to determine its nature, scope, duration and impacts. The Company’s preliminary analysis indicates that foreign\r\ngovernment involvement may be associated with this activity, and that data was taken. To the Company’s knowledge, its\r\nsystems housing customer and financial data were not affected. The Company is remediating the issue, and to date has not\r\nexperienced any related interruptions to its business operations or systems. Based on its investigation to date, the Company\r\nbelieves the activity is contained. At this time, the Company is unable to estimate the expenses it will incur in connection\r\nwith its investigation and remediation efforts.\"\r\nPossibly linked to China-backed threat actors\r\nWSJ who first reported on the incident states the breach affected major news arms of the conglomerate including The Wall\r\nStreet Journal, New York Post, and the company's U.K. news operation.\r\nAccording to WSJ's report, the incident allowed threat actors to access emails and documents of some News Corp\r\nemployees, including journalists.\r\nA statement provided by Mandiant explains that the cyber attack is possibly linked to China-backed threat actors.\r\n\"Mandiant assesses that those behind this activity have a China nexus, and we believe they are likely involved in espionage\r\nactivities to collect intelligence to benefit China's interests,\" says David Wong, vice president of incident response at\r\nMandiant.\r\nWhile disclosing further risks to its IT infrastructure, News Corp stressed, the cyber risk insurance policy it has in place may\r\nnot be sufficient \"to cover all losses from any breaches\" that have occurred or may occur in the future.\r\n\"Cyber risk insurance has also become more difficult and expensive to obtain, and the company cannot be certain that its\r\ncurrent level of insurance or the breadth of its terms and conditions will continue to be available on economically reasonable\r\nterms,\" states News Corp in its quarterly filing.\r\nhttps://www.bleepingcomputer.com/news/security/news-corp-discloses-hack-from-persistent-nation-state-cyber-attacks/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/news-corp-discloses-hack-from-persistent-nation-state-cyber-attacks/\r\nhttps://www.bleepingcomputer.com/news/security/news-corp-discloses-hack-from-persistent-nation-state-cyber-attacks/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/news-corp-discloses-hack-from-persistent-nation-state-cyber-attacks/"
	],
	"report_names": [
		"news-corp-discloses-hack-from-persistent-nation-state-cyber-attacks"
	],
	"threat_actors": [],
	"ts_created_at": 1775434893,
	"ts_updated_at": 1775826746,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/533738a54a1657d0badf2a0a87edf78618d19cc9.pdf",
		"text": "https://archive.orkl.eu/533738a54a1657d0badf2a0a87edf78618d19cc9.txt",
		"img": "https://archive.orkl.eu/533738a54a1657d0badf2a0a87edf78618d19cc9.jpg"
	}
}