UK blames China for Microsoft Exchange Server attack
Dominic Raab calls on the Chinese government to put an end to this "systematic cyber sabotage"
The UK government has accused China of being behind the Microsoft Exchange Server attack that is estimated to have affected more than a quarter of a million servers worldwide, of which 7,000 were based in the UK.
The UK government has now formally accused the Chinese Ministry of State Security of being behind the attack, claiming it ordered Hafnium, APT31, and APT40, also known as Leviathan, to orchestrate it.
It, along with counterparts in Europe and the US, also accused the Chinese government of ignoring “repeated calls to end its reckless campaign, instead allowing its state-backed actors to increase the scale of their attacks and act recklessly when caught” and urged it “to take responsibility for its actions and respect the democratic institutions, personal data and commercial interests of those with whom it seeks to partner”.
This includes reaffirming its 2015 commitment to “not to conduct or support cyber-enabled theft of intellectual property of trade secrets”.
Commenting on the announcement, foreign secretary Dominic Raab described the attack as “a reckless but familiar pattern of behaviour”.
How to increase cyber resilience within your organisation
Cyber resilience for dummiesDownload now
“The Chinese government must end this systematic cyber sabotage and can expect to be held account [sic] if it does not,” he said.
The EU joined the UK in condemning the Chinese government for the Exchange attack, stating that APT31 and APT40’s “irresponsible and harmful behaviour” had affected its “economy, security, democracy and society at large”.
“The EU and its member states strongly denounce these malicious cyber activities, which are undertaken in contradiction with the norms of responsible state behaviour as endorsed by all UN member states. We continue to urge the Chinese authorities to adhere to these norms and not allow its territory to be used for malicious cyber activities, and take all appropriate measures and reasonably available and feasible steps to detect, investigate and address the situation,” the EU Council said.
It also stated that it would “continue to enhance our cooperation, including with international partners and other public and private stakeholders, through increased exchange of information and continued diplomatic engagement, by strengthening cyber resilience and incident handling cooperation, as well as through joint efforts to improve the overall security of software and their supply chains”.
B2B under quarantine
Key B2C e-commerce features B2B need to adopt to surviveDownload now
The top three IT pains of the new reality and how to solve them
Driving more resiliency with unified operations and service managementDownload now
The five essentials from your endpoint security partner
Empower your MSP business to operate efficientlyDownload now
How fashion retailers are redesigning their digital future
Fashion retail guideDownload now