US and UK Expose Extensive Chinese Cyber Attacks and Espionage
On March 25, the United States and the United Kingdom revealed the reality of extensive cyber attacks and espionage conducted by China. Additionally, they announced the indictment of seven hackers believed to be involved in these activities, along with imposing sanctions on two individuals and one company suspected to be a front for the Chinese Ministry of State Security.
The hackers in question are part of a group known as “APT31,” allegedly supported by the Chinese government to carry out cyber attacks and espionage. Their targets range from White House staff to US senators, UK parliament members, and government officials critical of China worldwide.
According to the US government, APT31 targeted various sectors including American steel, energy companies, as well as prominent providers of 5G mobile communication systems and defense industries.
Monaco’s Deputy Attorney General highlighted that the global cyber attacks aimed to suppress criticisms of the Chinese Communist Party’s political system, infiltrate government systems worldwide, and steal corporate secrets.
US prosecutors explained that the seven indicted individuals allegedly gained unauthorized access to millions of Americans’ call records, emails, social media accounts, and more.
In addition, British authorities condemned APT31 for hacking activities targeting UK parliament members critical of China.
However, China rebutted these claims, asserting that they lack evidence. The Chinese Embassy in the UK stated that the accusations were fabricated and malicious.
Author’s Profile
Reporting on cybersecurity, surveillance, and disinformation for Reuters, this award-winning journalist specializes in exploring the convergence of technology and national security. They delve into state-sponsored espionage, deepfake-driven propaganda, and mercenary hacking, offering insights on how the evolving cybersecurity landscape impacts both government entities and businesses.
With a decade of experience at Reuters, including roles as Bureau Chief in Hanoi and Korea Correspondent in Seoul, this author has produced extensive coverage on hacks, leaks, and digital espionage in Europe. Their book, ‘North Korea Confidential,’ provides a unique glimpse into everyday life in North Korea.
**Our Code of Conduct: Thomson Reuters “Principles of Trust”**

