US and UK expose widespread Chinese cyber attacks and espionage activities, prosecute and impose sanctions on those involved

US and UK expose widespread Chinese cyber attacks and espionage activities, prosecute and impose sanctions on those involved

US and UK expose widespread Chinese cyber attacks and espionage activities, prosecute and impose sanctions on those involved

FILE PHOTO: A security camera is seen on a computer screen in front of a security camera taken by a security expert from the Ministry of State Security of China in Beijing, China, March 25, 2017. REUTERS/Kacper Pempel/File Photo

[ワシントン 25日 ロイター] – The United States and the United Kingdom announced on the 25th that they had uncovered widespread cyber attacks and espionage activities by China, indicted seven hackers for their involvement, and imposed sanctions on two of the seven hackers and one company believed to be a front for the Chinese Ministry of State Security.

The hacker group known as APT31 is said to have carried out cyber attacks and espionage activities with the support of the Chinese government, targeting a wide range of people, from White House staff to US senators and British members of parliament, as well as government officials around the world who are critical of China.

According to the U.S. government, the hacker group targeted American steel and energy companies, as well as major providers of 5G mobile communications systems and the defense industry.

Deputy Attorney General Monaco said the purpose of the global cyber attacks was to stifle criticism of the Chinese Communist Party’s political system, hack into government systems and steal confidential corporate information.

U.S. prosecutors said the seven people they charged are accused of illegally accessing or are suspected of illegally accessing the call records, emails, and social media accounts of millions of Americans.

British government officials also accused APT31 of hacking British members of parliament who have criticized China.

China has denied the allegations, saying they are “completely fabricated and maliciously slanderous.”

Our Code of Conduct:Thomson Reuters “Trust Principles”opens new tab

Reports on hacks, leaks and digital espionage in Europe. Ten years at Reuters with previous postings in Hanoi as Bureau Chief and Seoul as Korea Correspondent. Author of ‘North Korea Confidential’, a book about daily life in North Korea.

Reporter covering cybersecurity, surveillance, and disinformation for Reuters. Work has included investigations into state-sponsored espionage, deepfake-driven propaganda, and mercenary hacking.

Award-winning reporter covering the intersection between technology and national security with a focus on how the evolving cybersecurity landscape affects government and business.

Read More