Los Angeles Times

Microsoft attack blamed on China sharply grows

Email software hack escalates into a global crisis as perpetrato­rs automate the process.

- By William Turton and Jordan Robertson Turton and Robertson write for Bloomberg. Yueqi Yang of Bloomberg contribute­d to this report.

A sophistica­ted attack on Microsoft Corp.’s widely used business email software is morphing into a global cybersecur­ity crisis, as hackers race to infect as many victims as possible before companies can secure their computer systems.

The attack, which Microsoft has said started with a Chinese government­backed hacking group, has claimed at least 60,000 known victims globally, a former senior U.S. official with knowledge of the investigat­ion said. Many of them appear to be small or medium-size firms caught in a wide net the attackers cast as Microsoft worked to shut down the hack.

The European Banking Authority became one of the latest victims as it said Sunday that access to personal data through emails held on the Microsoft server may have been compromise­d.

Others include banks and electricit­y providers, as well as senior citizen homes and an ice cream company, according to Huntress, an Ellicott City, Md.-based firm that monitors the security of customers, in a blog post Friday.

One U.S. cybersecur­ity company that asked not to be named said its experts were working with at least 50 victims, trying to quickly determine what data the hackers may have taken while also trying to eject them.

The rapidly escalating attack came months after the SolarWinds Corp. breaches by suspected Russian cyberattac­kers and drew the concern of U.S. national security officials in part because the latest hackers were able to hit so many victims so quickly.

Researcher­s say in the final phases of the attack, the perpetrato­rs appeared to have automated the process, scooping up tens of thousands of new victims around the world in a matter of days.

Washington is preparing its first major moves in retaliatio­n against foreign intrusions over the next three weeks, the New York Times reported, citing unidentifi­ed officials. It plans a series of clandestin­e actions across Russian networks — intended to send a message to Vladimir Putin and his intelligen­ce services — combined with economic sanctions. President Biden could issue an executive order to shore up federal agencies against Russian hacking, the newspaper reported.

“We are undertakin­g a whole of government response to assess and address the impact,” a White House official wrote in an email Saturday. “This is an active threat still developing and we urge network operators to take it very seriously.”

The Chinese hacking group, which Microsoft calls Hafnium, appears to have been breaking into private and government computer networks through the company’s popular Exchange email software for a number of months, initially targeting only a small number of victims, said Steven Adair, head of northern Virginiaba­sed Volexity. The cybersecur­ity company helped Microsoft identify the flaws being used by the hackers for which the software giant issued a fix last week.

The result is a second cybersecur­ity crisis coming just months after suspected Russian hackers breached nine federal agencies and at least 100 firms through tampered updates from IT management software maker SolarWinds. Cybersecur­ity experts that defend the world’s computer systems expressed a growing sense of frustratio­n.

Asked about Microsoft’s attributio­n of the attack to China, a Chinese foreign ministry spokesman said Wednesday that the country “firmly opposes and combats cyber attacks and cyber theft in all forms” and suggested that blaming a particular nation was a “highly sensitive political issue.”

Both the most recent incident and the SolarWinds attack show the fragility of modern networks and the ability of sophistica­ted state-sponsored hackers to identify hard-to-find vulnerabil­ities or even create them to conduct espionage.

They also involve complex cyberattac­ks, with an initial blast radius of large numbers of computers, which is then narrowed as the attackers focus their efforts, which can take affected organizati­ons weeks or months to resolve.

In the case of the Microsoft bugs, simply applying the company-provided updates won’t remove the attackers from a network.

A review of affected systems is required, said Charles Carmakal, a senior vice president at FireEye Inc., the Milpitas, Calif.based cybersecur­ity company. And the White House emphasized the same thing, including tweets from the National Security Council urging victims to carefully comb through their computers for signs of the attackers.

Initially, the Chinese hackers appeared to be targeting high-value intelligen­ce targets in the U.S., Adair said. About a week ago, everything changed. Other unidentifi­ed hacking groups began hitting thousands of victims over a short period, inserting hidden software that could give them access later, he said.

Adair said other hacking groups may have found the same flaws and began their own attacks — or that China may have wanted to capture as many victims as possible, then sort out which had intelligen­ce value.

Smaller organizati­ons are “struggling already due to COVID shutdowns — this exacerbate­s an already bad situation,” said Jim McMurry, founder of Milton Security Group Inc., a cybersecur­ity monitoring service in Southern California.

Microsoft said customers that use its cloud-based email system are not affected.

The use of automation to launch very sophistica­ted attacks may mark a new era in cybersecur­ity, one that could overwhelm the limited resources of defenders, several experts said.

Some of the initial infections appear to have been from automated scanning and installati­on of malware, said Alex Stamos, a cybersecur­ity consultant. Investigat­ors will be looking for infections that led to hackers taking the next step and stealing data — such as email archives — and searching them for any valuable informatio­n later, he said.

“If I was running one of these teams, I would be pulling down email as quickly as possible indiscrimi­nately and then mining them for gold,” Stamos said.

Newspapers in English

Newspapers from United States