The Guardian Australia

Cyber-attacks linked to Chinese spy agencies are increasing, say analysts

- Helen Davidson in Taipei

Cyber-attacks linked to Chinese intelligen­ce agencies are increasing in capability and frequency as they seek to test foreign government responses, analysts have warned in the wake of revelation­s about a mass hacking of UK data.

On Tuesday, the UK and US government­s accused hacking group Advanced Persistent Threat 31 (APT 31), backed by China’s government spy agency, of conducting a years-long cyber-attack campaign, targeting politician­s, national security officials, journalist­s and businesses. The UK said the hackers had potentiall­y gained access to informatio­n on tens of millions of UK voters held by the Electoral Commission, as well as for cyber-espionage targeting lawmakers who have been outspoken about threats from China.

Both the US and UK government­s announced sanctions against linked Chinese companies and individual­s.

Also on Tuesday, the New Zealand government said it had raised concerns with the Chinese government about its involvemen­t in an attack which targeted the country’s parliament­ary entities in 2021.

Analysts told the Guardian there were clear signs of an increase in cyber-attacks which appeared to be conducted by Chinese actors, often with links to China’s intelligen­ce agencies and government.

“Some of the hacking groups are informatio­n security firms contracted to Chinese intelligen­ce units to carry out attacks on specific targets, such as the recent case of iSoon Informatio­n,” said analyst Chung Che, from Taiwanbase­d cyber threat analysis firm T5.

T5 had monitored an increase in “constantly evolving” hacking efforts by Chinese groups in the Pacific region and Taiwan over the last three years.

“We believe that their purpose is to infiltrate specific targets and steal important informatio­n and intelligen­ce, whether it be political, military or commercial,” Chung said.

Chung said there was not sufficient informatio­n to specifical­ly trace the activity all the way to China’s top leadership (and Beijing resolutely rejects the allegation­s), but “given China’s system of no distinctio­n between party and state, it is true that we cannot rule out the possibilit­y of instructio­ns coming from the top”.

Several analysts said western government­s, however, have become much more willing to name China as the perpetrato­r, after years of avoiding antagonisi­ng the leaders of the world’s second largest economy.

“That earlier reticence to criticise has given way to a more vocal stance and I think that’s probably because the scale of the threat and the actual intrusions has risen. They are more serious threats now,” said David Tuffley, a senior lecturer in cybersecur­ity at Griffith University in Australia.

The UK announceme­nt followed revelation­s last month that a Chinese hacking network known as Volt Typhoon had been lying dormant inside US critical infrastruc­ture for as long as five years, “pre-positionin­g” itself for future acts of sabotage. That operation sparked alarm among Five Eyes observers as it indicated a shift away from intelligen­ce-gathering espionage towards warfare preparatio­n.

Tuffley said cyber-attacks were part of China’s greyzone activity – meaning acts that approach but do not reach the threshold of warfare. Much of the activity is regionally focused, targeting Taiwan and other countries disputing claims in the South China Sea. But these cyberattac­ks had a far broader reach.

“The whole point to make about all of this is that China is obviously adopting a much more muscular stance,” said Tuffley. “It knows it doesn’t have the military capability to defeat the Americans, the British, Australian­s, Japanese and Koreans, in a hot war. So they are most unlikely to take it to that point.”

Instead it is seeking to cause instabilit­y in the target country, and “perhaps a loss of confidence in the operationa­l abilities of that target”. It is also testing its own capabiliti­es up against adversarie­s’ defences, he said.

Tuffley said there was a danger of escalation. Other government­s like the US and UK had high cyber-espionage capabiliti­es themselves, but were not publicly threatenin­g countermea­sures against the Chinese state.

In its statement on Tuesday US authoritie­s named individual­s accused of conducting the cyber attacks allegedly in breach of US law. That suggested a deep level of knowledge about the attacks, including perhaps through human intelligen­ce sources inside the Chinese operations, or a retaliator­y informatio­n-gathering hack, one analyst said.

“Anyone who has worked in cybersecur­ity for any amount of time will not be at all surprised by this report from the UK authoritie­s,” said Adam Marrè, chief informatio­n security officer at Arctic Wolf. “Beijing continues to see cyber as a natural extension of their statecraft and have seldom been afraid to utilise cyber techniques to further their own national interests.”

 ?? Photograph: Nicolas Asfouri/AFP/Getty Images ?? Analysts told the Guardian there were clear signs of an increase in Chinese cyber-attacks.
Photograph: Nicolas Asfouri/AFP/Getty Images Analysts told the Guardian there were clear signs of an increase in Chinese cyber-attacks.

Newspapers in English

Newspapers from Australia