The Guardian (USA)

Western government­s struggle to coordinate response to Chinese hacking

- Amy Hawkins Senior China correspond­ent

With the announceme­nt that the UK government would be imposing sanctions on two individual­s and one entity accused of targeting – without success – UK parliament­arians in cyber-attacks in 2021, the phrase “tip of the iceberg” comes to mind. But that would underestim­ate the iceberg.

James Cleverly, the home secretary, said the sanctions were a sign that “targeting our elected representa­tives and electoral processes will never go unchalleng­ed”.

But some experts saw it as a sign that the UK had been pushed into a corner by a decision in Washington to indict seven individual­s associated with the hacking outfit known as APT31, who are accused of engaging in a “prolific global hacking operation” that sent more than 10,000 malicious emails to politician­s, officials, journalist­s and critics of China across several continents.

The sanctions “won’t make a blind bit of difference” to the UK’s cybersecur­ity, according to Alan Woodward, a professor of cybersecur­ity at the University of Surrey, who said they were “the equivalent of sending a stiffly worded letter”. The UK government “have got to say something because the Americans are saying something, but still don’t want to upset the Chinese”.

The government revealed the historical hacking attempts on the same day that it pointed the finger at a “Chinese state-affiliated entity” for compromisi­ng the Electoral Commission’s systems between 2021 and 2022.

The Chinese embassy in London said the UK’s statement was “completely unfounded and constitute­s malicious slander”. But the UK did not accuse any of the sanctioned entities of being involved in that breach. The government has “conflated two separate issues in a way that is quite confusing to the general public”, said Jamie MacColl, a research fellow in cybersecur­ity at the Royal United Services Institute thinktank.

Part of the reason that the UK’s response is seen by some as being weak and confusing is that Chinese hacking attempts are not isolated events. Rather, they constitute the ecosystem in which all western government­s must navigate their relationsh­ips with Beijing. In a report published on 27 March, Google said China “continues to lead the way for government-backed exploitati­on”. APT31 alone has been linked to hacks in France, Finland and of Microsoft, while New Zealand said this week that another well-known Chinese hacking outfit, APT40, attacked its parliament in 2021 (the Chinese embassy in New Zealand denied the allegation­s).

A recent leak of data from the Chinese cybersecur­ity firm iSoon revealed the extent to which China’s hackers for hire compete for government contracts, sometimes hoovering up data from foreign agencies on spec with the hope of selling it to the highest bidder. In the case of APT31, the US Department of Justice alleges that the hacking operation was directly run by a provincial department of China’s ministry of state security.

But in general, said Mei Danowski, a China cybersecur­ity expert and author of the Natto Thoughts newsletter, nearly every cybersecur­ity firm in China would have some sort of contract with government clients. With a cybersecur­ity industry worth an estimated $13bn (£10.3bn), that is a lot of potential hackers.

That leaves western government­s struggling to coordinate an effective response to hacks or hacking attempts. In many cases, the Chinese government has plausible deniabilit­y about responsibi­lity, and it is not always clear what the impact of data breaches are. Audrye Wong, an assistant professor at the University of Southern California, said that while Russian-based hacks often “sow discord and chaos”, China was “more cautious” and “still very much cares about shaping perception­s of China and the Chinese Communist party”. Many western internatio­nal security experts refer to the maxim that while Russia may be the storm, China is climate change.

Danowski says that since the US indicted hackers associated with a company called Chengdu 404 in 2020, its business operations in China have carried on as normal, suggesting that the “name and shame” tactic adopted by the US and the UK this week may be symbolic at best.

And while China says it has “no interest or need to meddle in the UK’s internal affairs”, some cybersecur­ity experts note that gathering informatio­n on foreign states is the bread and butter of every country’s intelligen­ce operations – in other words, spies spy.

Reuters recently reported that Donald Trump, while president, had authorised a covert CIA operation on Chinese social media to turn Chinese public opinion against Beijing, in an operation that may still be active. If Chinese cyber-attacks lead to “the harassment of dissidents, I could see why sanctions would be justified”, said MacColl. “But from my perspectiv­e the activity that’s been named is predominan­tly political espionage.”

 ?? ?? Seven individual­s associated with the APT31 hacking outfit are accused of sending more than 10,000 malicious emails to politician­s, officials, journalist­s and critics of China. Photograph: Tero Vesalainen/Getty Images/iStockphot­o
Seven individual­s associated with the APT31 hacking outfit are accused of sending more than 10,000 malicious emails to politician­s, officials, journalist­s and critics of China. Photograph: Tero Vesalainen/Getty Images/iStockphot­o

Newspapers in English

Newspapers from United States