EU & NATO Agree To Confront The Chinese Cyber Threat

An alliance of NATO members, the European Union, Australia, New Zealand and Japan will confront the threat posed by Chinese state-sponsored cyber attacks. The group will share intelligence on cyber threats and collaborate on network defenses and security, according to a senior Biden administration official.

In its first joint action, the alliance will publicly blame China’s Ministry of State Security (MSS) for a cyber attack on Microsoft Exchange earlier this year, which is believed to have hit at least 30,000 American organisations and hundreds of thousands more worldwide.

The attack was carried out by criminal contract hackers working for the MSS who also engage in cyber-enabled extortion, crypto jacking and ransomware, the official said. Also, the Federal Bureau of Investigation, National Security Agency and the Cybersecurity and Infrastructure Security Agency (CISA) released a new advisory listing 50 tactics, techniques and procedures that Chinese state-sponsored hackers employ.

A Chinese espionage network dubbed Hafnium was named by Microsoft as the attack group. The delay in naming China was partly to give investigators time to assemble the evidence to prove that the Hafnium hackers were on the Chinese state payroll, the official said. It was also important for the United States to act in concert with its allies when it made the public attribution, said the official.

At a time when cyber warfare is becoming the front line in a global power struggle between democracies and autocratic states, the new cybersecurity alliance could become a model for future efforts to confront transnational threats.

The formation of the alliance is intended to build on President Biden’s effort earlier this summer to rally support among NATO and EU allies for a more confrontational approach to China and comes after a number of economic and diplomatic sanctions that the Biden administration has imposed on Beijing this year, in response to alleged human rights abuses in Hong Kong and in Xinjiang province.   Recently, the US sanctioned seven Chinese officials in response to the ongoing crackdown on Hong Kong’s democratic institutions.

The newly launched cybersecurity alliance is focused on cooperative security and threat alerts and not on retaliation.

The White House has raised the Microsoft attacks with senior members of the Chinese government “making clear that the People’s Republic of China's (PRC) actions threaten security, confidence, and stability in cyberspace... We’re not ruling out further actions to hold [China] accountable,” said the senior official, “but we’re also aware that no one action can change the PRC’s behaviour, and neither can one country acting on its own. So, we really focused initially in bringing other countries along with us.”

China Is To Strengthen Cyber Security Regulation

China's Ministry of Industry and Information Technology has published a draft three-year action plan to develop the country's cyber security industry, the market value of all the firms in the sector will be 250 billion yuan ($38.6 billion) by 2023.

  • “Residents in east China’s Shanghai are witnessing and benefiting from the application of a good number of AI and other digital technologies catering for economic and social development, people’s livelihood and other fields”, says the Chinese People’s Daily Online.
  • China’s Guangdong province said it plans to build a common data platform in the Greater Bay area, including Hong Kong and Macau, and a data trading market in Shenzhen. Guangdong will consider establishing a data ‘customs hub’ to review and supervise cross-border data, according to a People’s Government of Guangdong Province statement.  

The Chinese government will “promote the distribution and sharing of data between Guangdong, Hong Kong and Macau, and the use of data to benefit industrial development, social governance and services to people”.
 

CNBC:        PinsentMasons:     Xinhuanet:     Chinese Foreign Ministry:      People's Daily:   Gov.Guangdong:

Cyberspace Affairs Commission:      CNBC

You Might Also Read:  

China’s National Cyber Security Powerhouse Strategy:

 

 

« Looking For Love May Have Unexpected Consequences
Britain & The USA Have Been Spying On Their Friends »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Titania

Titania

Titania provide network security and compliance software. Find your Network Security gaps before hackers do with our security & compliance tools.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

Lawley Insurance

Lawley Insurance

Lawley is a full-service, independent insurance agency. Specialty insurance products include Cyber Security.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Swimlane

Swimlane

Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond and neutralize cyber threats with adaptability, efficiency and speed.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

Inversion6

Inversion6

Inversion6 (formerly MRK Technologies) is a cybersecurity risk management provider that offers custom security solutions.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.