Alan W. Dowd is a Senior Fellow with the American Security Council Foundation, where he writes on the full range of topics relating to national defense, foreign policy and international security. Dowd’s commentaries and essays have appeared in Policy Review, Parameters, Military Officer, The American Legion Magazine, The Journal of Diplomacy and International Relations, The Claremont Review of Books, World Politics Review, The Wall Street Journal Europe, The Jerusalem Post, The Financial Times Deutschland, The Washington Times, The Baltimore Sun, The Washington Examiner, The Detroit News, The Sacramento Bee, The Vancouver Sun, The National Post, The Landing Zone, Current, The World & I, The American Enterprise, Fraser Forum, American Outlook, The American and the online editions of Weekly Standard, National Review and American Interest. Beyond his work in opinion journalism, Dowd has served as an adjunct professor and university lecturer; congressional aide; and administrator, researcher and writer at leading think tanks, including the Hudson Institute, Sagamore Institute and Fraser Institute. An award-winning writer, Dowd has been interviewed by Fox News Channel, Cox News Service, The Washington Times, The National Post, the Australian Broadcasting Corporation and numerous radio programs across North America. In addition, his work has been quoted by and/or reprinted in The Guardian, CBS News, BBC News and the Council on Foreign Relations. Dowd holds degrees from Butler University and Indiana University. Follow him at twitter.com/alanwdowd.

ASCF News

Scott Tilley is a Senior Fellow at the American Security Council Foundation, where he writes the “Technical Power” column, focusing on the societal and national security implications of advanced technology in cybersecurity, space, and foreign relations.

He is an emeritus professor at the Florida Institute of Technology. Previously, he was with the University of California, Riverside, Carnegie Mellon University’s Software Engineering Institute, and IBM. His research and teaching were in the areas of computer science, software & systems engineering, educational technology, the design of communication, and business information systems.

He is president and founder of the Center for Technology & Society, president and co-founder of Big Data Florida, past president of INCOSE Space Coast, and a Space Coast Writers’ Guild Fellow.

He has authored over 150 academic papers and has published 28 books (technical and non-technical), most recently Systems Analysis & Design (Cengage, 2020), SPACE (Anthology Alliance, 2019), and Technical Justice (CTS Press, 2019). He wrote the “Technology Today” column for FLORIDA TODAY from 2010 to 2018.

He is a popular public speaker, having delivered numerous keynote presentations and “Tech Talks” for a general audience. Recent examples include the role of big data in the space program, a four-part series on machine learning, and a four-part series on fake news.

He holds a Ph.D. in computer science from the University of Victoria (1995).

Contact him at stilley@cts.today.

US, allies blame China-linked hackers for Microsoft Exchange breach

Monday, July 19, 2021

Categories: ASCF News Cyber Security

Comments: 0

Source: https://thehill.com/homenews/administration/563622-us-allies-blame-china-linked-hackers-for-microsoft-exchange-breach?rl=1

Getty Images

The United States and several allied countries on Monday publicly blamed hackers affiliated with the Chinese government for the Microsoft Exchange Server hack that left tens of thousands of organizations vulnerable to compromise earlier this year.

The move to publicly identify the hackers as linked to China is part of a broader effort by the U.S. and its allies to publicly call out Beijing's government for malicious behavior in cyberspace.

The U.S, European Union, United Kingdom, Australia, Canada, New Zealand, Japan and NATO on Monday criticized China’s Ministry of State Security (MSS) for using criminal contract hackers to conduct cyber-enabled extortion, "crypto-jacking" and other schemes.

The U.S. government has with "high confidence" formally attributed the exploitation of vulnerabilities in Microsoft’s Exchange Server application to malicious cyber actors affiliated with China’s MSS. Other nations also attributed the cyberattack to Chinese government-linked hackers.

Microsoft had previously said it believed a hacking group known as “HAFNIUM,” a Chinese-state sponsored hacking group, was exploiting the vulnerabilities in the program. U.S. officials had said they were working to attribute the hack, which was first detected in March. Hackers used zero-day exploits to attack versions of Microsoft's Exchange Server application and hack into victims' email accounts.

“The PRC’s pattern of irresponsible behavior in cyberspace is inconsistent with its stated objective of being seen as a responsible leader in the world,” the senior official told reporters during a call Sunday evening, referring to China by its official name. “Countries around the world are making it clear that concerns regarding the PRC’s malicious cyber activity is bringing them together to call out this activity, promote network defense and cybersecurity, and act to disrupt threats to our economies and national security.”

The Biden administration official indicated that the attribution process was longer than others because of the scope of the compromises and the desire to work with allies to formally make the charge.

The official said it was also important to combine the announcement with information on indicators of compromise. The FBI, National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) on Monday are exposing more than 50 tactics, techniques and procedures used by Chinese state-sponsored hackers when targeting networks in the U.S. and other countries and providing recommendations to protect against the tactics.

Beyond calling out the Chinese government for the aggression in cyberspace, the U.S. is not expected to take significant actions at this stage to punish Beijing, but is leaving the door open to taking action in the future.

“The U.S. and our allies and partners are not ruling out further actions to hold the PRC accountable,” the official said. “We are putting forward a common cyber approach with our allies and laying down clear expectations on how responsible nations behave in cyberspace.”

The Justice Department on Monday morning announced charges against four Chinese nationals working with China’s MSS for participating in a global computer hacking campaign, including three officers of a provincial arm of the MSS. However, the defendants are likely currently out of reach in China, meaning they will not face prosecution unless U.S. officials are able to extradite them.

The U.S. is also aware of reports of MSS-linked hackers conducting ransomware operations against private companies, the official said, without providing any specifics on those attacks.

The developments are likely to exacerbate tensions between the U.S. and China. President Biden has scolded China for its human rights abuses, unfair economic practices and other behavior and has framed his agenda as necessary in order to outcompete Beijing.

Biden has also encouraged other nations to draw a harder line on China, including pressing the Group of Seven (G7) to more forcefully rebuke Beijing over human rights in the Xinjiang region during his first trip abroad last month.

NATO is for the first time condemn the Chinese government’s cyber activities on Monday, the senior Biden official said, after the alliance said that China presents “systemic challenges to the rules-based international order” following its summit last month.

“In line with our recent Brussels Summit Communiqué, we call on all States, including China, to uphold their international commitments and obligations and to act responsibly in the international system, including in cyberspace,” NATO said in the statement on Monday. “We also reiterate our willingness to maintain a constructive dialogue with China based on our interests, on areas of relevance to the Alliance such as cyber threats, and on common challenges.”

Comments RSS feed for comments on this page

There are no comments yet. Be the first to add a comment by using the form below.

Search