Microsoft experts concluded several years ago that Chinese authorities had hacked into more than a thousand Hotmail email accounts, particularly those of international leaders of China’s Tibetan and Uighur minorities, but it decided not to tell the victims, allowing the hackers to continue their campaign, according to former employees of the company.
On Dec. 30, after a series of requests for comment from Reuters, Microsoft said it would change its policy and will tell its email customers when it suspects there has been a government hacking attempt.
The company also confirmed for the first time that it had not called, emailed or otherwise told the Hotmail users that their electronic correspondence had been collected. The company declined to say what role the exposure of the Hotmail campaign played in its decision to make the policy shift.
The first public indication of the attacks came in May 2011, when security firm Trend Micro announced it found an email sent to someone in Taiwan that contained a miniature computer program. No direct link was immediately made with the Chinese authorities.
The program took advantage of a previously undetected flaw in Microsoft's Web pages to direct Hotmail and other free Microsoft email services to secretly forward copies of all of a recipient's incoming mail to an account controlled by the attacker.
Trend Micro found more than a thousand victims, and Microsoft patched the vulnerability before the security company announced its findings publicly.
Microsoft launched its own investigation that year, finding that some interception began in July 2009 and compromised the emails of top Uighur and Tibetan leaders in multiple countries as well as Japanese and African diplomats, human rights lawyers and others in sensitive positions in China, two former Microsoft employees said. They spoke separately and on the condition that they not be identified to avoid possible professional repercussions.
Some of the attacks came from a Chinese network known as AS4808, which has been associated with major spying campaigns, including a 2011 attack on EMC's security division RSA that U.S. intelligence officials publicly attributed to China.
To see the report, click here.
Microsoft officials did not dispute that most of the attacks came from China but said some came from elsewhere. They did not give further details.
"We weighed several factors in responding to this incident, including the fact that neither Microsoft nor the U.S. government [was] able to identify the source of the attacks, which did not come from any single country," the company said. "We also considered the potential impact on any subsequent investigation and ongoing measures we were taking to prevent potential future attacks."
In announcing the new policy, Microsoft said, "As the threat landscape has evolved, our approach has too, and we'll now go beyond notification and guidance to specify if we reasonably believe the attacker is state-sponsored."
The Chinese government "is a resolute defender of cybersecurity and strongly opposes any forms of cyberattacks," Chinese Foreign Ministry spokesman Lu Kang said, adding that it punishes any offenders in accordance with the law.
"I must say that if the relevant party has some real and conclusive evidence, then it can carry out mutually beneficial cooperation with China in a constructive way in accordance with the existing channels," he said at a daily news briefing. "But if there's the frequent spreading of unfounded rumors, it will, in fact, be of no benefit to solving the problem, enhancing mutual trust and promoting cybersecurity."
The Cyberspace Administration of China did not respond to a request for comment.
After a vigorous internal debate in 2011 that reached Microsoft's top security official, Scott Charney, and its then–general counsel and now president, Brad Smith, the company decided not to alert the users clearly that anything was amiss, the former employees said. Instead, it simply forced users to pick new passwords without disclosing the reason.
The employees said it was likely the hackers by then had footholds in some of the victims' machines and therefore saw those new passwords being entered.
One of the reasons Microsoft executives gave internally in 2011 for not issuing explicit warnings was their fear of angering the Chinese government, two people familiar with the discussions said.
Microsoft's statement did not address the specific positions advocated by Smith and Charney. A person familiar with the executives' thinking said that fear of Chinese reprisals played a role, given the company's concerns about the potential impact on customers.
Microsoft said the company believed the password resets would be the fastest way to restore security to the accounts. "Our primary concern was ensuring that our customers quickly took practical steps to secure their accounts, including by forcing a password reset," the statement said.
It is unclear what happened to the email users and their correspondents as a result of Microsoft's failure to alert them to the suspected government hacking. But some of those affected said they were now deeply worried about the risks, especially for those in China.
"The Internet service providers and the email providers have an ethical and a moral responsibility to let the users know that they are being hacked," said Seyit Tumturk, the vice president of the World Uyghur Congress, whose account was among those compromised. "We are talking in people's lives here."
Unrest in Xinjiang, the Chinese region bordering Kazakhstan that is home to many Uighurs, has resulted in hundreds of people's deaths in recent years. Beijing blames Islamic militants, while human rights groups say harsh controls on Uighurs' religion and culture have led to the violence.
Until Wednesday, Microsoft rejected the idea of explicit warnings about state-sponsored hacking, such as those Google began in 2012, the former employees said. In the 2011 case, the company also opted not to send a more generic warning about hacking. Yahoo and Facebook have been issuing such warnings for several years, former employees of those companies told Reuters, including when the principal suspect was a government.
Both companies, along with Twitter, announced in recent months that they would follow Google's lead and explicitly notify users about suspected state-sponsored hacking.
Google said that on average it now issues tens of thousands of warnings about targeting every few months and that recipients often move to improve their security with two-factor authentication and other steps.
Reuters interviewed five of the Hotmail hacking victims who were identified as part of Microsoft's investigation: two Uighur leaders, a senior Tibetan figure and two people in the media dealing with matters of interest to Chinese officials.
Most recalled the password resets, but none took the procedure as an indication that anyone had read his or her email, let alone that it may have been accessed by the Chinese government.
"I thought it was normal — everybody gets it," said one of the men, a Uighur émigré now living in Europe who asked not to be named because he has family members still in China.
Another victim identified by Microsoft's internal team was Tseten Norbu of Nepal, a former president of the Tibetan Youth Congress, one of the more outspoken members of a community that has frequently clashed with Chinese officials. Another Microsoft-identified victim was Tumturk of the World Uyghur Congress, who lives in Turkey.
Microsoft investigators also saw that emails were forwarded from the account of Peter Hickman, a former U.S. diplomatic officer who arranged high-profile speeches by international figures at the National Press Club in Washington for many years.
He said he used his Hotmail account on Press Club computers for correspondence with, among others, staffers for the Tibetan government in exile, whose leader Lobsang Sangay spoke at the club in 2011; the World Uyghur Congress, whose then-President Rebiya Kadeer spoke there in 2009; and the president of Taiwan, who spoke there via video link in 2007.
Hickman said he didn't recall the password reset. He said he never suspected anything was wrong with the account, which he continues to use.
No comments:
Post a Comment