Chinese Hackers: ‘Chinese hackers breach US ambassador’s emails’ – Times of India

WASHINGTON: Beijing-linked hackers accessed US ambassador to China Nicholas Burns‘ email account in an espionage operation thought to have compromised at least hundreds of thousands of individual US government emails, the Wall Street Journal (WSJ) reported on Thursday.
Daniel Kritenbrink, the assistant secretary of state for East Asia, was also hacked in the wider spying operation disclosed earlier this month by Microsoft, the report said, citing people familiar with the matter.
Asked about the reported breach of the two diplomats’ accounts, the State Department declined to give any details and said its investigation of the spying operation was ongoing.
Before the WSJ report appeared, Kritenbrink was asked at a congressional hearing on US China policy whether he could rule out that his or his staff’s emails were targeted in the Microsoft hack.
“I can’t comment on an investigation that’s underway being conducted by the FBI, but no, I will not rule it out,” Kritenbrink said.
Burns and Kritenbrink join US Commerce Secretary Gina Raimondo as the only publicly named victims of the espionage campaign, which prompted a warning by Washington’s top diplomat to his Chinese counterpart.
China’s embassy in Washington did not immediately respond to a request for comment on the report, but the Chinese Ministry of Foreign Affairs previously called the earlier accusations “disinformation.”
Microsoft said last week that Chinese hackers misappropriated one of its digital keys and used a flaw in its code to steal emails from US government agencies and other clients.
The company did not immediately return a message seeking comment on the WSJ report.
The breach has thrown Microsoft’s security practices under scrutiny, with officials and lawmakers calling on the Redmond, Washington-based company to make its top level of digital auditing, also called logging, available to all its customers free of charge.
Microsoft said in a statement late on Thursday that it was taking the criticism on board.
Last week, White House National Security Council spokesperson Adam Hodge said an intrusion in Microsoft’s cloud security “affected unclassified systems,” without elaborating.
“Officials immediately contacted Microsoft to find the source and vulnerability in their cloud service,” Hodge added.
The State Department “detected anomalous activity” and “took immediate steps to secure our systems,” a department spokesperson said in a statement at the time.

function loadGtagEvents(isGoogleCampaignActive) { if (!isGoogleCampaignActive) { return; } var id = document.getElementById('toi-plus-google-campaign'); if (id) { return; } (function(f, b, e, v, n, t, s) { t = b.createElement(e); t.async = !0; t.defer = !0; t.src = v; t.id = 'toi-plus-google-campaign'; s = b.getElementsByTagName(e)[0]; s.parentNode.insertBefore(t, s); })(f, b, e, 'https://www.googletagmanager.com/gtag/js?id=AW-877820074', n, t, s); };

window.TimesApps = window.TimesApps || {}; var TimesApps = window.TimesApps; TimesApps.toiPlusEvents = function(config) { var isConfigAvailable = "toiplus_site_settings" in f && "isFBCampaignActive" in f.toiplus_site_settings && "isGoogleCampaignActive" in f.toiplus_site_settings; var isPrimeUser = window.isPrime; if (isConfigAvailable && !isPrimeUser) { loadGtagEvents(f.toiplus_site_settings.isGoogleCampaignActive); loadFBEvents(f.toiplus_site_settings.isFBCampaignActive); } else { var JarvisUrl="https://jarvis.indiatimes.com/v1/feeds/toi_plus/site_settings/643526e21443833f0c454615?db_env=published"; window.getFromClient(JarvisUrl, function(config){ if (config) { loadGtagEvents(config?.isGoogleCampaignActive); loadFBEvents(config?.isFBCampaignActive); } }) } }; })( window, document, 'script', );

For all the latest world News Click Here 

Read original article here

Denial of responsibility! TechAI is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.