Feeds

Hackers not responsible for New York Times website wipeout

Hours-long outage attributed to internal systems fault

Using blade systems to cut costs and sharpen efficiencies

The website of The New York Times was unavailable for at least an hour on Wednesday morning, but the newspaper says the outage wasn't due to malicious attacks, as some had feared.

The NYT website first went dark around 11:30am Eastern Time and continued to display nothing but a terse "Service Unavailable" error for several hours.

When the outage first struck, staffers used the paper's Twitter account to let readers know that the problem was being addressed, but said only that the site was "experiencing technical difficulties" and that it would be back up shortly. The NYT email server was reportedly also affected.

The paper's edit staff posted details of breaking stories to the official Times Facebook feed during the downtime, an unusual move that was criticized by the anti-Zuck set.

What's more, the timing of the outage led some to speculate that it may have been the result of a deliberate attack. It coincided with several important events, most notably Egypt's bloody crackdown of protests by supporters of ousted president Mohamed Morsi.

The NYT has been the victim of hacking attacks in the past. In January it reported that its staffers' email accounts had been compromised by hackers linked to the Chinese military. On Wednesday, security research firm FireEye said the same group responsible for those attacks could be ready for more mischief.

Once the Times's website was restored late Wednesday afternoon, however, the paper's IT bods said that no outside forces were to blame for the morning's service interruption. In a message titled "To Our Customers," an anonymous staffer wrote:

As you may know, our Web site was unavailable for a period of time earlier today. The outage occurred within seconds of a scheduled maintenance update, which we believe was the cause. We are working on fully restoring service and apologize for any inconvenience.

Just which portions of the site's infrastructure still need repairs isn't clear. According to reports from around the web, the newspaper's full contents were available to readers in most regions by the time it posted the apology.

In all, it was a much shorter and less damaging outage than the Outlook and SkyDrive debacle that Microsoft suffered on Wednesday, which began in the early morning and which – as this Reg hack goes to press the big, red "Post" button – has yet to be resolved. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.