Exclusive: China hacked eight major computer services firms in
years-long attack
Send a link to a friend
[June 26, 2019] By
Jack Stubbs, Joseph Menn and Christopher Bing
LONDON (Reuters) - Hackers working for China's Ministry of State
Security broke into networks of eight of the world's biggest technology
service providers in an effort to steal commercial secrets from their
clients, according to sources familiar with the attacks.
Reuters today reported extensive new details about the global hacking
campaign, known as Cloud Hopper and attributed to China by the United
States and its Western allies.
Read the full report here:
https://www.reuters.
com/investigates/special-report/china-cyber-cloudhopper
A U.S. indictment in December outlined an elaborate operation to steal
Western intellectual property in order to advance China's economic
interests but stopped short of naming victim companies. A Reuters report
at the time identified two: Hewlett Packard Enterprise and IBM.
Now, Reuters has found that at least six other technology service
providers were compromised: Fujitsu, Tata Consultancy Services, NTT
Data, Dimension Data, Computer Sciences Corporation and DXC Technology,
HPE's spun-off services arm.
Reuters has also identified more than a dozen victims who were clients
of the service providers. That list includes Swedish telecoms giant
Ericsson, U.S. Navy shipbuilder Huntington Ingalls Industries and travel
reservation system Sabre.
HPE said it worked "diligently for our customers to mitigate this attack
and protect their information." DXC said it had "robust security
measures in place" to protect itself and clients, neither of which have
"experienced a material impact" due to Cloud Hopper.
NTT Data, Dimension Data, Tata Consultancy Services, Fujitsu and IBM
declined to comment. IBM has previously said it has no evidence
sensitive corporate data was compromised by the attacks.
Sabre said it had disclosed a cybersecurity incident in 2015 and an
investigation concluded no traveler data was accessed. A Huntington
Ingalls spokeswoman said the company is "confident that there was no
breach of any HII data" via HPE or DXC.
[to top of second column] |
A man holds a laptop computer as cyber code is projected on him in
this illustration picture taken on May 13, 2017. REUTERS/Kacper
Pempel/Illustration
Ericsson said it does not comment on specific cybersecurity incidents. "While
there have been attacks on our enterprise network, we have found no evidence in
any of our extensive investigations that Ericsson's infrastructure has ever been
used as part of a successful attack on one of our customers," a spokesman said.
The Chinese government has consistently denied all accusations of involvement in
hacking. The Chinese Foreign Ministry said Beijing opposed cyber-enabled
industrial espionage. "The Chinese government has never in any form participated
in or supported any person to carry out the theft of commercial secrets," it
said in a statement to Reuters.
The Cloud Hopper attacks carry worrying lessons for government officials and
technology companies struggling to manage security threats.
Chinese hackers, including a group known as APT10, were able to continue the
attacks in the face of a counter-offensive by top security specialists and
despite a 2015 U.S.-China pact to refrain from economic espionage.
Reuters was unable to detail the full extent of the damage done by the hacking
and many victims are unable to tell exactly what was stolen. Yet senior Western
intelligence officials say the toll was high.
"This was a sustained series of attacks with a devastating impact," said Robert
Hannigan, former director of Britain’s GCHQ signals intelligence agency and now
European chairman at cybersecurity firm BlueVoyant.
(Additional reporting by Gao Liangping, Cate Cadell and Ben Blanchard in
Beijing. Editing by Ronnie Greene and Jonathan Weber)
[© 2019 Thomson Reuters. All rights
reserved.] Copyright 2019 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.
Thompson Reuters is solely responsible for this content. |