Exclusive: U.S. manufacturing group hacked by China as
trade talks intensified - sources
Send a link to a friend
[November 13, 2019] By
Christopher Bing
WASHINGTON (Reuters) - As trade talks
between Washington and Beijing intensified earlier this year, suspected
Chinese hackers broke into an industry group for U.S. manufacturers that
has helped shape President Donald Trump's trade policies, according to
two people familiar with the matter.
The National Association of Manufacturers (NAM) was hacked over the
summer and hired a cybersecurity firm, which concluded the attack came
from China, the two sources said.
The security firm, which the sources did not name, made the assessment
based on the usage of tools and techniques previously associated with
known Chinese hacking groups, they said.
The hack of an internal computer network at a powerful Washington
industry group illustrates how China has tried to gain an advantage in
the trade war between the world's two biggest economies.
It is unclear what data was stolen. NAM hired the outside cybersecurity
firm to respond to the breach and stop the intrusion.
Spokeswoman Erin Streeter said that given NAM's high profile, "we know
we are a target for cyber-attacks. We identified suspicious activity
relating to certain company systems and investigated the matter."
She added that their network is now secure. The White House did not
respond to a request for comment. The Chinese embassy in Washington did
not immediately respond to a request for comment.
The two sources and another familiar with the attack said the suspected
Chinese hackers intensified their efforts to steal information in the
days surrounding a meeting between Trump and NAM President Jay Timmons
this summer.
The incident occurred shortly before a round of formal negotiations
between U.S. and Chinese government officials over the contents of a
potential deal, said one of the people familiar with the matter.
The intrusion is the latest by suspected Chinese hackers against U.S.
industry trade groups during the Trump administration as Beijing seeks
to learn more about U.S. policy positions, according to cybersecurity
industry insiders who have handled similar breaches.
[to top of second column] |
U.S. President Donald Trump and China's President Xi Jinping shake
hands after making joint statements at the Great Hall of the People
in Beijing, China, November 9, 2017. REUTERS/Damir Sagolj/File Photo
The trade talks between the Trump administration and Beijing have included
intellectual property protections and the opening of China's markets to more
U.S. products, issues that directly impact NAM's members.
NAM has gained considerable influence under the Trump administration as the
president has continuously promised the return of manufacturing jobs to the
United States from foreign countries, such as China and Mexico, during campaign
events.
NAM has helped the Trump administration organize public events in manufacturing
plants across the country. In October, for example, Timmons joined Vice
President Mike Pence at a Pennsylvania manufacturing facility to call for
passage of the recently negotiated United States-Mexico-Canada Agreement.
Trump spoke at the trade group's annual conference in 2017, promising "the era
of economic surrender is over." In response, Timmons has called Trump a "true
champion" of U.S. manufacturing.
It is unclear why hackers targeted NAM, but national security experts say it is
well known that Chinese government agencies try to steal sensitive company
secrets and other information, which can give them a leg up in business
negotiations.
The U.S. Justice Department has indicted multiple alleged Chinese hackers and
spies in 2019 for stealing data from private American companies.
Top secret documents, made public by former National Security Agency contractor
Edward Snowden and publisher WikiLeaks, show the NSA has also spied on foreign
officials involved in trade negotiations with the U.S. government.
(Reporting by Christopher Bing; Editing by Chris Sanders and Sonya Hepinstall)
[© 2019 Thomson Reuters. All rights
reserved.] Copyright 2019 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.
Thompson Reuters is solely responsible for this content. |