China brands Microsoft hacking report ‘disinformation’

&Tab;&Tab;<div class&equals;"wpcnt">&NewLine;&Tab;&Tab;&Tab;<div class&equals;"wpa">&NewLine;&Tab;&Tab;&Tab;&Tab;<span class&equals;"wpa-about">Advertisements<&sol;span>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"u top&lowbar;amp">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<amp-ad width&equals;"300" height&equals;"265"&NewLine;&Tab;&Tab; type&equals;"pubmine"&NewLine;&Tab;&Tab; data-siteid&equals;"111265417"&NewLine;&Tab;&Tab; data-section&equals;"2">&NewLine;&Tab;&Tab;<&sol;amp-ad>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;<&sol;div><p>China has called a Microsoft report that a China-based hacking group breached government-linked email accounts &OpenCurlyDoubleQuote;disinformation”&comma; saying on Wednesday that the accusation is aimed at diverting attention from US cyber activities&period;<&sol;p>&NewLine;<p>In a blog post published on Tuesday&comma; Microsoft said the group&comma; which it identified as Storm-0558&comma; gained access to email accounts linked to 25 organisations&comma; including Western European government agencies&period;<&sol;p>&NewLine;<p>The breach was detected weeks later when customers complained to Microsoft about abnormal email activity&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;We assess this adversary is focused on espionage&comma; such as gaining access to email systems for intelligence collection&comma;” Microsoft’s executive vice president of security&comma; Charlie Bell&comma; said in a separate Microsoft post&period;<&sol;p>&NewLine;<p>A Washington Post report cited a statement from US officials claiming that Storm-0558 also breached unclassified email accounts linked to the US government&period;<&sol;p>&NewLine;<p>Chinese foreign ministry spokesman Wang Wenbin said the accusation is &OpenCurlyDoubleQuote;disinformation” aimed at diverting attention from US cyberattacks on China&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;No matter which agency issued this information&comma; it will never change the fact that the United States is the world’s largest hacker empire conducting the most cyber theft&comma;” he said in a routine briefing&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;Since last year&comma; the cybersecurity organisations of China and other countries have issued many reports exposing the cyber attacks on China by the US government over a long period of time&comma; but the US has not made a response so far&comma;” he added&period;<&sol;p>&NewLine;<p>US National Security Adviser Jake Sullivan&comma; who is at the Nato summit in Vilnius&comma; Lithuania&comma; with US President Joe Biden&comma; told ABC’s Good Morning America programme that the investigation is continuing&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;We detected it fairly rapidly and we were able to prevent further breaches&comma;” he said&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;The matter is still being investigated&comma; so I have to leave it there because we’re gathering further information in consultation with Microsoft and we will continue to appraise the public as we learn more&period;”<&sol;p>&NewLine;<p>The Storm-0558 hackers used forged authentication tokens – pieces of information used to verify the identity of a user – required to access the email accounts&comma; Microsoft said&comma; adding that it has dealt with the attack and informed affected customers&period;<&sol;p>&NewLine;<p>Microsoft said it is working with the Department of Homeland Security and the Cybersecurity and Infrastructure Security Agency&comma; among others&comma; to guard against such attacks&period; It also said it will continue to monitor Storm-0558’s activities&period;<&sol;p>&NewLine;<p>Last month&comma; Google-owned cybersecurity firm Mandiant said suspected state-backed Chinese hackers broke into the networks of hundreds of public and private sector organisations globally by using a security hole in a popular email security tool&period;<&sol;p>&NewLine;<p>Earlier this year&comma; Microsoft said state-backed Chinese hackers were targeting US critical infrastructure and could be laying the technical groundwork to disrupt critical communications between the US and Asia during future crises&period;<&sol;p>&NewLine;&Tab;&Tab;&Tab;<div style&equals;"padding-bottom&colon;15px&semi;" class&equals;"wordads-tag" data-slot-type&equals;"belowpost">&NewLine;&Tab;&Tab;&Tab;&Tab;<div id&equals;"atatags-dynamic-belowpost-68cd31e6e3bd1">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<script type&equals;"text&sol;javascript">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback &equals; function &lpar;&rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; false &equals;&equals;&equals; &lpar; window&period;isWatlV1 &quest;&quest; false &rpar; &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&sol;&sol; Use Aditude scripts&period;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings &equals; window&period;tudeMappings &vert;&vert; &lbrack;&rsqb;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings&period;push&lpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;divId&colon; 'atatags-dynamic-belowpost-68cd31e6e3bd1'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;format&colon; 'belowpost'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; document&period;readyState &equals;&equals;&equals; 'loading' &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;document&period;addEventListener&lpar; 'DOMContentLoaded'&comma; window&period;getAdSnippetCallback &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; else &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback&lpar;&rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;script>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>


Discover more from London Glossy Post

Subscribe to get the latest posts sent to your email.

- Advertisement -
Exit mobile version