Chinese hackers target UK gov’t

Chinese hackers launched a major attack on the U.K. Parliament earlier this month, the government’s email filtering company MessageLabs Ltd. has confirmed.

The attack, which occurred on Jan. 2, attempted to exploit the Windows Meta File (WMF) vulnerability to hijack the PCs of more than 70 named individuals, including researchers, secretaries and members of parliament (MPs) themselves.

Emails were sent to staff, with an attachment that contained the WMF-exploiting Setabortproc Trojan. Anyone opening this attachment would have enabled attackers to browse files, and possibly install a key-logging program to attempt the theft of passwords. None of the emails got through to the intended targets, MessageLabs said, but the U.K. authorities were alerted.

The WMF flaw was first made public in November and only patched by Microsoft on Jan. 5. Given that the first exploit was reported on Dec. 29, this offered the attackers a “zero day” window in which to launch the Trojan assault.

MessageLabs was reported by The Guardian newspaper — which broke the story — as saying the source of the emails had been traced to servers in China’s Guangdong Province, hence the suspicion that the latest attack was part of a more general campaign of electronic subversion.

This is not the first time the U.K. government has come under Trojan attack from China. Last summer, the National Infrastructure Security Co-ordination Centre (NISCC) reported that U.K. government departments had been hit by a wave of Trojans originating in China.

At the time, the organization was more circumspect in attributing blame, however, describing the source in general terms as “often linked to the Far East”. There appear to be no such sensitivities this time around.

The use of targeted Trojans to carry out espionage was first reported by Techworld last May, when Israeli authorities uncovered a massive electronic spying operation by a large number of the country’s companies to steal files from their business rivals. On that occasion, the information theft had succeeded on a scale involving tens of thousands of documents.

It is hard to say who looks worst from the latest news. Microsoft Corp. will be severely embarrassed that a major customer was attacked using a flaw the company had warned of but not managed to patch. Likewise, the fact the attack is being openly attributed to China must be uncomfortable for the authorities there, who know they are assumed to approve any sophisticated use of the Internet in the country.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now