News

Alleged White House E-Mail Cyber Incident now Called Attack from China

Officials in the United Kingdom now suggest that a cyberattack from purported White House e-mail accounts actually originated from China, and the perpetrator used a hoax e-mail address that resembled a White House account. Nevertheless, the U.K. officials are also calling for more cooperation among governments to jointly agree on policies for state-based covert cyber activity.

The initial reports on Feb. 4 from British Foreign Secretary William Hague indicated that e-mail messages alleged to be from the White House were sent to several British officials in late December. The e-mails contained links that, if opened, would download a virus onto the user's computer.

It was first unclear if the attack came from authentic White House e-mail accounts that had been hacked and infected with a virus or from fake e-mail accounts made to resemble White House e-mail messages. In recent days, the latter scenario appears the more likely.

According to several news accounts, Hague referred to “spoof” White House e-mail accounts, suggesting that the messages were not authentic.

Meanwhile, the Guardian reported that the cyberattack is now believed to have originated in China.

Although the foreign secretary did not name the country behind the attacks, intelligence sources familiar with the incidents made it clear the originating country was China, the Guardian said in an article Feb. 4.

"In late December a spoof e-mail purporting to be from the White House was sent to a large number of international recipients who were directed to click on a link that then downloaded a variant of Zeus," Hague said, according to the article. "The U.K. government was targeted in this attack and a large number of e-mails bypassed some of our filters. Our experts were able to clear up the infection, but more sophisticated attacks such as these are becoming more common."

On Feb. 6, in a subsequent article in the Guardian, Hague indicated that more international agreement is needed for state-based covert cyber activity. The article suggested that the United States may be involved in such activity.

About the Author

Alice Lipowicz is a staff writer for 1105 Media's Washington Technology.

Featured

  • Microsoft and SAP Enhance Partnership with Teams Integration

    Microsoft and SAP this week described continuing partnership efforts on Microsoft Azure, while also planning a Microsoft Teams integration with SAP's enterprise resource planning product and other solutions.

  • Blue Squares Graphic

    Microsoft Previews Azure IoT Edge for Linux on Windows

    Microsoft announced a preview of Azure IoT Edge for Linux on Windows, which lets organizations tap Linux virtual machine processes that also work with Windows- and Azure-based processes and services.

  • How To Automate Tasks in Azure SQL Database

    Knowing how to automate tasks in the cloud will make you a more productive DBA. Here are the key concepts to understand about cloud scripting and a rundown of the best tools for automating code in Azure.

  • Microsoft Open License To End Next Year for Government and Education Groups

    Microsoft's "Open License program" will end on Jan. 1, 2022, and not just for commercial customers, but also for government, education and nonprofit organizations.

comments powered by Disqus