US Ambassador To China Hacked

The US ambassador to Beijing, Nicholas Burns, is an American officials whose emails were hacked by a Chinese cyber spying hack.

Also hit was Daniel Kritenbrink, the Assistant Secretary of State for East Asia. The US admitted the email account of the commerce secretary, Gina Raimondo, had also been compromised.

US officials said that these officials were the three most senior targets, but many more could have been breached.

It was not clear how much sensitive US government information had been compromised.

Apparently the Secretary of State Antony Blinken’s email had not been breached, nor had those of his inner circle of advisers. But Kritenbrink accompanied the secretary on the trip to China recently and Burns had also attended meetings with the country’s leader, Xi Jinping, and other senior Chinese officials in the course of the visit.

It is thought possible that the hackers got access to US preparations for the meetings and the internal discussions about them.

US intelligence officials said they were surprised by the sophistication of the cyber-attack, which used a flaw in Microsoft’s cloud computing environment which has since been mended says Microsoft.  

Microsoft identified the hackers as the Chinese group Storm-0558, which apparently focuses on espionage hacks.

Recently officials said that hackers based in China hacked accounts of the State and Commerce departments, but they did not say how many people were affected.

The federal Cybersecurity and Infrastructure Security Agency said that it learned of the hacking campaign in mid-June and that the campaign lasted around a month.

Microsoft has now offered existing customers a series of enhanced digital forensic tools, following frustration from US officials that the high price tag it placed on core security products had prevented many lower-paying victims from detecting the breach.

Reuters:     The Wall Street Journal:     The Guardian:     Independent:     NBC News:     US Dept. Of State:     Politico

 

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« Norway’s Government Ministries Hit by Cyber Attack
Banks Hacked With Open-Source Software »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

Audea

Audea

Audea is a consultancy firm specialising in cybersecurity, risk and compliance. We provide professional services addressing all areas of Cybersecurity and GRC.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.