CNET attacked by Russian hacker group

Photo of message exchange between CNET and wOrm CNET was informed about the hack attack via a Twitter conversation

Related Stories

A Russian hacker group has attacked the news site CNET. It later said it stole usernames, encrypted passwords and emails for more than one million users.

CNET said a representative from the group - which calls itself 'w0rm' - informed it about the hack via a Twitter conversation.

A spokeswoman for CBS Interactive - the owner of CNET - said the firm had "identified the issue and resolved it".

According to CNET, w0rm offered to sell the database for 1 Bitcoin, or $622.

But it added that the hacking group said the plan to sell the database was to gain attention and "nothing more".

Improve security?

The representative of the group claimed that it hacked CNET servers to improve the overall security on the internet.

The group has claimed to have successfully hacked the BBC last year, as well as websites of Adobe and Bank of America.

It says that by targeting high-profile websites it can raise awareness of security issues.

"[W]e are driven to make the Internet a better and safer [place] rather than a desire to protect copyright," the representative said in a Twitter exchange with CNET.

On Monday, the representative offered a security solution to CNET by tweeting: "#CNET I have good protection system for u, ping me".

According to CNET, 27.1 million unique users visited its desktop and mobile sites in the US in June this year.

More on This Story

Related Stories

More Technology stories

RSS

Features & Analysis

BBC Future

wikipedia

The future of CGI... from 1982

How we forecast computer animation back then Read more...

Programmes

  • A cyborg cockroachClick Watch

    The cyborg cockroach - why has a computer been attached to this insect’s nervous system?

Try our new site and tell us what you think. Learn more
Take me there

Copyright © 2015 BBC. The BBC is not responsible for the content of external sites. Read more.

This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.