UK blames China for Microsoft Exchange Server attack
Dominic Raab calls on the Chinese government to put an end to this "systematic cyber sabotage"
The UK government has accused China of being behind the Microsoft Exchange Server attack that is estimated to have affected more than a quarter of a million servers worldwide, of which 7,000 were based in the UK.
The UK government has now formally accused the Chinese Ministry of State Security of being behind the attack, claiming it ordered Hafnium, APT31, and APT40, also known as Leviathan, to orchestrate it.
It, along with counterparts in Europe and the US, also accused the Chinese government of ignoring “repeated calls to end its reckless campaign, instead allowing its state-backed actors to increase the scale of their attacks and act recklessly when caught” and urged it “to take responsibility for its actions and respect the democratic institutions, personal data and commercial interests of those with whom it seeks to partner”.
This includes reaffirming its 2015 commitment to “not to conduct or support cyber-enabled theft of intellectual property of trade secrets”.
Commenting on the announcement, foreign secretary Dominic Raab described the attack as “a reckless but familiar pattern of behaviour”.
How to increase cyber resilience within your organisation
Cyber resilience for dummiesDownload now
“The Chinese government must end this systematic cyber sabotage and can expect to be held account [sic] if it does not,” he said.
The EU joined the UK in condemning the Chinese government for the Exchange attack, stating that APT31 and APT40’s “irresponsible and harmful behaviour” had affected its “economy, security, democracy and society at large”.
“The EU and its member states strongly denounce these malicious cyber activities, which are undertaken in contradiction with the norms of responsible state behaviour as endorsed by all UN member states. We continue to urge the Chinese authorities to adhere to these norms and not allow its territory to be used for malicious cyber activities, and take all appropriate measures and reasonably available and feasible steps to detect, investigate and address the situation,” the EU Council said.
It also stated that it would “continue to enhance our cooperation, including with international partners and other public and private stakeholders, through increased exchange of information and continued diplomatic engagement, by strengthening cyber resilience and incident handling cooperation, as well as through joint efforts to improve the overall security of software and their supply chains”.
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download