Home World White House: Chinese government hires contract hackers for global cyber operations

White House: Chinese government hires contract hackers for global cyber operations

by news dir

On the 19th (local time), the White House of the United States identified the Chinese government as a malicious cyber hacking force and announced a plan to respond directly. In March, the attack on Microsoft’s ‘Exchange’ email server also claimed that the Chinese government was involved, and announced that it would hold them accountable.

Joint statement with allies such as Five Eyes
“March MS attack, Chinese Ministry of National Security intervened
“Ransomware demands millions of dollars”
Malicious hacking regulations, hard response notice

“The United States has long been concerned about China’s irresponsible and destabilizing behavior in cyberspace,” the White House said in an explanatory note released on the same day. We will disclose the details and respond further.” In the statement, the European Union (EU), Britain, Canada, Australia, New Zealand, and other intelligence alliances ‘Five Eyes’, Japan, and NATO also joined.

The White House alleges that the Chinese government is employing hackers to conduct cyber operations against the world. He also said that hackers who have worked with the Ministry of National Security, a Chinese intelligence agency, are conducting ransomware attacks and cryptojacking (the act of mining virtual currency by planting malicious code on other people’s computers) to gain financial gain.

The White House said, “China’s failure to address the criminal acts committed by contract hackers has caused governments and businesses to lose billions of dollars in intellectual property infringements, etc.” We have also seen cases where they attacked and demanded millions of dollars in ransom.”

The White House confirmed that the hacking of Microsoft’s email and messaging platform ‘Exchange’, confirmed in March, was also committed by hackers belonging to the Ministry of National Security of China. Microsoft immediately announced that the Chinese government-backed hacker group ‘Hafnium’ led the way, and the White House has created a ‘Cyber ​​Integration Coordination Group’ to take measures against hacking. At the time, it is estimated that at least 30,000 organizations were affected by the hacking in the United States alone.

The White House also said the Justice Department plans to prosecute four hackers belonging to China’s Ministry of State Security. They explained that they have been attacking governments and defense industries in more than a dozen countries for years and have also attempted to steal Ebola vaccine technology.

Earlier, a senior US administration official said in a telephone briefing on the previous day that “China’s pattern of irresponsible behavior in cyberspace is inconsistent with its stated goal of being a responsible leader in the world.” It is interpreted as a statement aimed directly at President Xi Jinping (習近平).

Separately from the White House, the National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) within the Department of Homeland Security disclosed more than 50 methods of Chinese hackers on the same day. “Malicious cyber activists sponsored by China are used to steal sensitive information, critical emerging technology, intellectual property, and personally identifiable information from employees and organizations in the political, economic, military, educational and critical infrastructures of the United States and its allies,” the three organizations said. It was the target of the attack,” he said.

US media such as CNBC evaluated that the US-China conflict, which began in earnest under the Donald Trump administration, expanded beyond trade and technology to cyberspace, and that a ‘cyber security alliance’ against China was newly formed.

Washington = Correspondent Park Hyun-young [email protected]

Related Articles

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.