Advertisement
Supported by
U.S. Formally Accuses China of Hacking Microsoft
The Biden administration is also expected to organize a broad group of allies to condemn Beijing for cyberattacks around the world, but stop short of taking concrete punitive steps.
WASHINGTON — The Biden administration on Monday formally accused the Chinese government of breaching Microsoft email systems used by many of the world’s largest companies, governments and military contractors, as the United States joined a broad group of allies, including all NATO members, to condemn Beijing for cyberattacks around the world.
The United States accused China for the first time of paying criminal groups to conduct large-scale hackings, including ransomware attacks to extort companies for millions of dollars, according to a statement from the White House. Microsoft had pointed to hackers linked to the Chinese Ministry of State Security for exploiting holes in the company’s email systems in March; the U.S. announcement on Monday morning was the first suggestion that the Chinese government hired criminal groups to hack tens of thousands of computers and networks around the world for “significant remediation costs for its mostly private sector victims,” according to the White House.
Secretary of State Antony J. Blinken said in a statement on Monday that China’s Ministry of State Security “has fostered an ecosystem of criminal contract hackers who carry out both state-sponsored activities and cybercrime for their own financial gain.”
“These contract hackers cost governments and businesses billions of dollars in stolen intellectual property, ransom payments, and cybersecurity mitigation efforts, all while the MSS had them on its payroll,” Mr. Blinken said.
Condemnation from NATO and the European Union is unusual, because most of their member countries have been deeply reluctant to publicly criticize China, a major trading partner. But even Germany, whose companies were hit hard by the hacking of Microsoft Exchange — email systems that companies maintain on their own, rather than putting them in the cloud — cited the Chinese government for its work.
“We call on all states, including China, to uphold their international commitments and obligations and to act responsibly in the international system, including in cyberspace,” according to a statement from NATO.
Despite the broadside, the announcement lacked sanctions similar to ones that the White House imposed on Russia in April, when it blamed the country for the extensive SolarWinds attack that affected U.S. government agencies and more than 100 companies. (The Justice Department on Friday did unseal an indictment from May charging for Chinese residents with a campaign to hack computer systems of dozens of companies, universities and government entities in the United States between 2011 and 2018. The hackers developed front companies to hide any role the Chinese government had in backing the operation, according to the Justice Department.)
By imposing sanctions on Russia and organizing allies to condemn China, the Biden administration has delved deeper into a digital Cold War with its two main geopolitical adversaries than at any time in modern history.
While there is nothing new about digital espionage from Russia and China — and efforts by Washington to block it — the Biden administration has been surprisingly aggressive in calling out both countries and organizing a coordinated response.
But so far, it has not yet found the right mix of defensive and offensive actions to create effective deterrence, most outside experts say. And the Russians and the Chinese have grown bolder. The SolarWinds attack, one of the most sophisticated ever detected in the United States, was an effort by Russia’s lead intelligence service to alter code in widely used network-management software to gain access to more than 18,000 businesses, federal agencies and think tanks.
China’s effort was not as sophisticated, but it took advantage of a vulnerability that Microsoft had not discovered and used it to conduct espionage and undercut confidence in the security of systems that companies use for their primary communications. It took the Biden administration months to develop what officials say is “high confidence” that the hacking of the Microsoft email system was done at the behest of the Ministry of State Security, the senior administration official said, and abetted by private actors who had been hired by Chinese intelligence.
The last time China was caught in such broad-scale surveillance was in 2014, when it stole more than 22 million security-clearance files from the Office of Personnel Management, allowing a deep understanding of the lives of Americans who are cleared to keep the nation’s secrets.
President Biden has promised to fortify the government, making cybersecurity a focus of his summit meeting in Geneva with President Vladimir V. Putin of Russia last month. But his administration has faced questions about how it will also address the growing threat from China, particularly after the public exposure of the Microsoft hacking.
Speaking to reporters on Sunday, the senior administration official acknowledged that the public condemnation of China would only do so much to prevent future attacks.
“No one action can change China’s behavior in cyberspace,” the official said. “And neither could just one country acting on its own.”
But the decision not to impose sanctions on China was also telling: It was a step many allies would not agree to take.
Instead, the Biden administration settled on corralling enough allies to join the public denunciation of China to maximize pressure on Beijing to curtail the cyberattacks, the official said.
The joint statement criticizing China, to be issued by the United States, Australia, Britain, Canada, the European Union, Japan and New Zealand, is unusually broad. It is also the first such statement from NATO publicly targeting Beijing for cybercrimes.
The European Union condemned on Monday “malicious cyberactivities” undertaken from the Chinese territory but stopped short of denouncing the responsibility of the Chinese government.
“This irresponsible and harmful behavior resulted in security risks and significant economic loss for our government institutions and private companies, and has shown significant spillover and systemic effects for our security, economy and society at large,” Josep Borrell Fontelles, the E.U.’s foreign policy chief, said in a statement. “These activities can be linked to the hacker groups,” the statement added.
Mr. Borrell called on Chinese authorities not to allow “its territory to be used” for such activities, and to “take all appropriate measures and reasonably available and feasible steps to detect, investigate and address the situation.”
The National Security Agency, F.B.I. and Cybersecurity and Infrastructure Security Agency also issued an advisory on Monday warning that Chinese hacking presented a “major threat” to the United States and its allies. China’s targets include “political, economic, military, and educational institutions, as well as critical infrastructure.”
Criminal groups hired by the government aim to steal sensitive data, critical technologies and intellectual properties, according to the advisory.
The F.B.I. took an unusual step in the Microsoft hacking: In addition to investigating the attacks, the agency obtained a court order that allowed it to go into unpatched corporate systems and remove elements of code left by the Chinese hackers that could allow follow-up attacks. It was the first time that the F.B.I. acted to remediate an attack as well as investigate its perpetrators.
Monika Pronczuk contributed reporting from Brussels.
Advertisement
No comments:
Post a Comment