Military Space News
CYBER WARS
Commerce secretary, State Department targeted in Microsoft email hack
Commerce secretary, State Department targeted in Microsoft email hack
by A.L. Lee
Washington DC (UPI) Jul 13, 2023

The departments of State and Commerce confirmed hackers breached their systems during a cyberattack that targeted Microsoft email accounts at government agencies in Europe and the United States, but officials stopped short of blaming China.

Commerce Secretary Gina Raimondo's emails were hacked in the breach, making her the only Cabinet-level official to be compromised so far, The Washington Post, ABC News and CNN reported.

A congressional staffer, a U.S. humanitarian advocate and a host of research institutes across the country, were also targeted, according to The Washington Post.

The breach, discovered on June 16, targeted nine U.S. organizations among 25 global entities, as well as individuals associated with them, through apparent cracks in Microsoft's cloud security systems.

Only a small fraction of government email accounts in the U.S. were exposed before the hack was contained, officials said.

In a Tuesday statement, Microsoft said it successfully thwarted the attack and placed blame on "an adversary based in China" who was "focused on espionage."

"We have successfully blocked Storm-0558 from accessing customer email," the company said, referring to an unidentified hacker based in China who managed to gain access to the Outlook email accounts.

Microsoft engineers found out about the breach from the government on June 16, but a preliminary investigation has since determined the trail of anomalous mail activity went back as far as May 15.

Earlier this year, Raimondo took steps to impose sanctions on China, but has since vowed to seek improved relations after a sit-down with her Chinese counterpart in May.

The breach, which came to light just days before Secretary of State Anthony Blinken's visit to Beijing in mid-June, was still being investigated to determine its full scope.

The FBI said no U.S. secrets were believed to be compromised, and that the attack was extinguished before spreading beyond the email protocol.

In a statement to the Washington Post, National Security Council spokesman Adam Hodges confirmed the hackers had only gained access to unclassified information.

"Officials immediately contacted Microsoft to find the source and vulnerability in their cloud service. We continue to hold the procurement providers of the U.S. government to a high security threshold."

On Wednesday, State Department spokesperson Matthew Miller said his agency responded swiftly to the breach, but he refused to speculate whether China was involved.

"We have not yet made a public attribution," he said. "I can say that last month the State Department detected anomalous activity. We did two things immediately. One, we took immediate steps to secure our systems, and two, took immediate steps to notify Microsoft of the event."

"As a matter of cyber security policy, we do not discuss the details of our response. The incident remains under investigation, and we continuously monitor our networks and update our security procedures," he added.

The hackers used forged electronic authentication tokens to pull the email data, Microsoft said, adding that "it only takes one successfully compromised account login to gain persistent access."

The incident was the latest in a series of recent Chinese actions against IT systems throughout Western Europe, Microsoft said, while trying to reassure customers that their personal data was safe.

Tensions have escalated between Beijing and Washington in the wake of an explosive episode in February in which Biden ordered the U.S. military to shoot down a Chinese spy balloon after it drifted across the country for several days.

In May, Western intelligence agencies accused China of spying on critical U.S. infrastructure as part of a worldwide surveillance campaign.

The latest breach also comes as the Biden administration has stepped up efforts to uproot Chinese telecommunications equipment worldwide amid increasing fears of espionage.

In retaliation, China has begun blocking access to its rich supply of raw materials that are needed to make next-generation microchips.

With tensions rising in Southeast Asia, the U.S. government was working with its global partners to stop emerging technologies from reaching China as Washington was wary that Beijing could use the advances to enhance its war machine.

Earlier this year President Joe Biden banned federal employees from using TikTok on government devices, citing national security concerns as the app was owned by the Chinese company ByteDance. The popular app has also been banned on government devices in dozens of U.S. states.

Hacking fears have also reached a fever pitch on Capitol Hill as several lawmakers have introduced bills that would severely limit domestic use of Chinese technology.

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

Subscribe Free To Our Daily Newsletters
Tweet

RELATED CONTENT
The following news reports may link to other Space Media Network websites.
CYBER WARS
Blinken warns Beijing on hacking as US, China keep dialogue going
Jakarta (AFP) July 13, 2023
US Secretary of State Antony Blinken warned Beijing's top diplomat on Thursday of consequences over hacking after a breach blamed on China again threatened to undermine a nascent stability in ties between the two powers. Less than a month after Blinken paid a rare visit to Beijing, he met for more than an hour and a half with Wang Yi, the Chinese Communist Party's foreign policy supremo, on the sidelines of Southeast Asian talks in Jakarta. "Director, good to see you," a smiling Blinken said in ... read more

CYBER WARS
Lockheed Martin achieves milestone in PAC-3 MSE Integration with Aegis Weapon System

Swiss want in on Germany's Sky Shield plan

Lockheed Martin targets small businesses via Next Generation Interceptor

Poland to buy US Patriot missile defense systems worth $15 bn

CYBER WARS
Millennium Space Systems Missile Track Custody PDR complete in just four months

First French long-range missiles already in Ukraine

France to send Ukraine SCALP long-range missiles: Macron

France's SCALP missiles: long-range weapon for Ukraine's armoury

CYBER WARS
Pentagon calls on Russia to stop 'reckless behavior' in Syria

U.S. kills ISIS leader in Syria with drones that had been harassed by Russia

CENTCOM: Russian jets harassed U.S. drones in Syria

Drones steal the spotlight at Paris Air Show

CYBER WARS
ATLAS Space launches Freedom Space for Government Missions

SYRACUSE 4B Satellite Launched: Boost for French Military Communications

DoD awards Global X-Band Blanket Purchase Agreement to SES

Ensuring reliable communications between US and Partners at the tactical edge

CYBER WARS
US military pinned down by Republican fire on 'wokeness'

US cluster munitions delivered to Ukraine

RTX secures $117M contract with US Army for Advanced Targeting Sensor Systems

Fury among aid groups as US approves cluster bombs for Ukraine

CYBER WARS
UK minister warns West 'not Amazon' for Ukraine weapons

Germany pledges 700 mn euros in new arms aid to Ukraine

Biden thanks Erdogan for Sweden decision, backs F-16s sale

Cuba, Russia envisage technical-military cooperation

CYBER WARS
Big power disputes in spotlight at Southeast Asia security meet

Zelensky hails 'security victory' after G7 vow support

Biden had to be an Erdogan whisperer. But then came Zelensky

Turkey will not ratify Sweden's NATO bid before October: Erdogan

CYBER WARS
Single-molecule valve: a breakthrough in nanoscale control

Subscribe Free To Our Daily Newsletters




The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.