U.S. to accuse China of trying to hack vaccine data, as coronavirus redirects cyberattacks
WASHINGTON >> The FBI and the Department of Homeland Security are preparing to issue a warning that China’s most skilled hackers and spies are working to steal American research in the crash effort to develop vaccines and treatments for the coronavirus. The efforts are part of a surge in cybertheft and attacks by nations seeking advantage in the pandemic.
The warning comes as Israeli officials accuse Iran of mounting an effort in late April to cripple water supplies as Israelis were confined to their houses, though the government has offered no evidence to back its claim. More than a dozen countries have redeployed military and intelligence hackers to glean whatever they can about other nations’ virus responses. Even U.S. allies like South Korea and nations that do not typically stand out for their cyber abilities, like Vietnam, have suddenly redirected their state-run hackers to focus on virus-related information, according to private security firms.
A draft of the forthcoming public warning, which officials say is likely to be issued in the days to come, says China is seeking “valuable intellectual property and public health data through illicit means related to vaccines, treatments and testing.” It focuses on cybertheft and action by “nontraditional actors,” a euphemism for researchers and students the Trump administration says are being activated to steal data from inside academic and private laboratories.
The decision to issue a specific accusation against China’s state-run hacking teams, current and former officials said, is part of a broader deterrent strategy that also involves U.S. Cyber Command and the National Security Agency. Under legal authorities that President Donald Trump issued nearly two years ago, they have the power to bore deeply into Chinese and other networks to mount proportional counterattacks. This would be similar to their effort 18 months ago to strike at Russian intelligence groups seeking to interfere in the 2018 midterm elections and to put malware in the Russian power grid as a warning to Moscow for its attacks on U.S. utilities.
But it is unclear exactly what the U.S. has done, if anything, to send a similar shot across the bow to the Chinese hacking groups, including those most closely tied to China’s new Strategic Support Force, its equivalent of Cyber Command, the Ministry of State Security and other intelligence units.
The forthcoming warning is also the latest iteration of a series of efforts by the Trump administration to blame China for being the source of the pandemic and exploiting its aftermath.
Don't miss out on what's happening!
Stay in touch with top news, as it happens, conveniently in your email inbox. It's FREE!
Secretary of State Mike Pompeo claimed this month that there was “enormous evidence” that the virus had come from a Chinese lab before backing off to say it had come from the “vicinity” of the lab in Wuhan. U.S. intelligence agencies say they have reached no conclusion on the issue, but public evidence points to a link between the outbreak’s origins at a market in Wuhan and China’s illegal wildlife trafficking.
The State Department on Friday described a Chinese Twitter campaign to push false narratives and propaganda about the virus. Twitter executives have pushed back on the agency, noting that some of the Twitter accounts that the State Department cited were actually critical of Chinese state narratives.
But it is the search for vaccines that has been a particular focus, federal officials say.
Security experts say that while there is a surge of attacks by Chinese hackers seeking an edge in the race for a COVID-19 vaccine, or even effective treatment, the Chinese are hardly alone in seeking to exploit the virus.
Iranian hackers were also caught trying to get inside Gilead Sciences, the maker of remdesivir, the therapeutic drug approved 10 days ago by the Food and Drug Administration for clinical trials. Government officials and Gilead have refused to say if any element of the attack, which was first reported by Reuters, was successful.
Israel’s security advisers met last week for a classified session on a cyberattack on April 24 and 25, which authorities were calling an attempt to cut off water supplies to rural parts of the country. The Israeli news media has widely blamed the attack on Iran, though they have offered no evidence in public. The effort was detected fairly quickly and did no damage, authorities said.
The rush to attribute the attack to Iran could be faulty. When a Saudi petrochemical plant was similarly attacked in 2017, Iran was presumed as the source of the effort to cause an industrial accident. It turned out to be coordinated from a Russian scientific institute.
The coronavirus has created whole new classes of targets. In recent weeks, Vietnamese hackers have directed their campaigns against Chinese government officials running point on the virus, according to cybersecurity experts.
South Korean hackers have taken aim at the World Health Organization and officials in North Korea, Japan and the U.S. The attacks appeared to be attempts to compromise email accounts, most likely as part of a broad effort to gather intelligence on virus containment and treatment, according to two security experts for private firms who said they were not authorized to speak publicly. If so, the moves suggest that even allies are suspicious of official government accounting of cases and deaths around the world.
In interviews with a dozen current and former government officials and cybersecurity experts over the past month, many described a “free-for-all” that has spread even to countries with only rudimentary cyber ability.
“This is a global pandemic, but unfortunately countries are not treating it as a global problem,” said Justin Fier, a former national security intelligence analyst who is now the director of cyberintelligence at Darktrace, a cybersecurity firm. “Everyone is conducting widespread intelligence gathering — on pharmaceutical research, PPE orders, response — to see who is making progress.”
The frequency of cyberattacks and the spectrum of targets are “astronomical, off the charts,” Fier said.
Even before the pandemic, the U.S. was becoming far more aggressive in pursuing cases that involved suspected Chinese efforts to steal intellectual property related to biological research. The Justice Department announced in January that it had charged Charles M. Lieber, the chairman of Harvard’s Department of Chemistry and Chemical Biology, with making false statements related to his participation in China’s Thousand Talents program to recruit scientific talent to the country.
But Harvard also has a joint study program underway with a Chinese institute on coronavirus treatments and vaccines. And researchers have said that international cooperation will be vital if there is hope for a global vaccine, putting the expected national competitions to be first in tension with the need for a cooperative effort.
At Google, security researchers identified more than a dozen nation-state hacking groups using virus-related emails to break into corporate networks, including some sent to U.S. government employees. Google did not identify the specific countries involved, but over the past eight weeks, several nation states — some familiar, like Iran and China, and others not so familiar, like Vietnam and South Korea — have taken advantage of softer security as millions of workers have suddenly been forced to work from home.
“The nature of the vulnerabilities and attacks has altered pretty radically with shelter-in-place,” said Casey Ellis, founder of Bugcrowd, a security firm. In some cases, Ellis said, hackers were just “kicking a baby,” hacking hospitals that were already overstretched and simply lacked the resources to prioritize cybersecurity.
In other cases, they were targeting the tools that workers used to remotely access internal networks and encrypted virtual private networks, or VPNs, that allow employees to tunnel into corporate networks, to gain access to proprietary information.
“Governments that might otherwise be reluctant to target international public health organizations, hospitals and commercial organizations are crossing that line because there is such a thirst for knowledge and information,” said John Hultquist, director of intelligence analysis at FireEye, a cybersecurity firm.
Even Nigerian cybercriminals are getting in on the game: They recently started targeting businesses with coronavirus-themed email attacks to try to convince targets to wire them money, or to steal personal data that could fetch money on the dark web.
“These are not complex, but clever social engineering is getting them through,” said Jen Miller-Osborn, deputy director of threat intelligence at Palo Alto Networks, a cybersecurity company. Because Nigerian hackers are less skilled, they lack the “opsec,” or operational security, to cover their tracks.
© 2020 The New York Times Company