The UK Fights Back Against China’s Cyberattack

August 16,2024

Criminology

China's Covert Data Theft: Electoral Commission Breach Exposes Millions 

The UK government has placed sanctions on Chinese-backed hackers after a serious security breach exposed the personal data of 40 million voters. Deputy Prime Minister Oliver Dowden has unequivocally blamed APT31, a state-affiliated Chinese group known for its malicious cyber campaigns. 

Between 2021 and 2022, the group infiltrated the Electoral Commission's email and file-sharing systems. They successfully accessed copies of the electoral register, a serious breach that could have far-reaching consequences. Additionally, in 2021, APT31 attempted to spy on various MPs and peers. 

"This is the latest in a clear pattern of hostile activities originating in China," Dowden stated. "While it is obviously concerning, the compromise has not affected the security of UK elections." 

To counter the threat, the government is imposing sanctions on two individuals and one entity linked with APT31. 

Cybersecurity Experts Remain Concerned 

Professor Alan Woodward, a cybersecurity expert at the University of Surrey and an advisor to Europol (the EU's law enforcement agency), finds this recent attack unsurprising. "Part of [China's] overseas policy has always been to try and undermine Western democracies," he told Metro.co.uk. 

Furthermore, Professor Woodward expressed doubt that sanctions will be an effective deterrent. "We've had sanctions against Russia for ages because of Ukraine. But they still mount disinformation and misinformation campaigns and try to break into infrastructure. The Chinese do exactly the same thing." 

The Electoral Commission Breach: A Closer Look 

The government disclosed that APT31 was behind both the Electoral Commission hack and the attempts to gather intelligence on Parliament members. APT, an acronym for "advanced persistent threat", refers to a state or state-sponsored hacker who stealthily gains unauthorized access to a network over an extended period. 

Governments like Russia and China often outsource their hacking operations to these groups, according to Professor Woodward. This strategy enables them to maintain "plausible deniability" regarding these attacks. 

The UK government has, in the past, raised concerns about the hacking activities of another group, APT10 (also known as Stone Panda or Red Apollo). APT10 is believed to have ties with China's Ministry of State Security. 

cyberattack

What Data Was Breached? 

In the Electoral Commission hack, the attackers accessed names, email addresses, home addresses, and phone numbers of people registered to vote in the UK. While much of this data can be purchased on the "open register," individuals are allowed to opt out of having their information included. 

The Electoral Commission has asserted that using this stolen data to manipulate the UK's paper-based elections would be "very hard." 

China's Motives: A Puzzling Question 

Although the Electoral Commission stated that the breach itself does not present "a high risk to individuals," they admitted the stolen data could be cross-referenced with publicly available information, such as social media profiles. This strategy could help the attackers "infer patterns of behaviour or to identify and profile individuals." 

"The Chinese have a reputation for wanting to suck up as much information as possible," Professor Woodward explained. "They've got more of a vacuum cleaner approach rather than a particularly targeted one." 

China's Global Data Collection: A Strategic Play? 

Professor Woodward elaborated, "If you vacuum up a lot of data, you can consolidate it and then use that for mass targeting of demographics." He points to the 2016 US presidential elections where swing voters in marginal areas were targeted. This strategy may have contributed to Donald Trump winning the election. 

In that election cycle, Cambridge Analytica collected data from millions of US voters' Facebook profiles. This data allowed them to build predictive software, designed to influence voter behavior through highly targeted advertisements on the platform. The Guardian reported that over 50 million Facebook profiles were harvested by the company, which was headed by Trump ally Steve Bannon and owned by a wealthy hedge fund manager, Robert Mercer. 

While Facebook has since improved transparency measures around political advertising, social media remains a critical component of political campaigns. To illustrate this, data compiled by Who Targets Me shows that just this year, Labour and the Conservatives have already spent a combined total of nearly £1.8 million on Facebook and Instagram ads. This amount represents nearly a ten-fold increase over the same period last year when spending totaled only £191,348. 

Professor Woodward cautions that attempting to exploit political advertising on social media platforms would be a challenge "if all you've got is a name and address and no voting intention." However, the cumulative nature of China's data collection efforts raises significant implications. 

How Do Hackers Gain Access? 

The idea of hackers often creates an image of mysterious figures in dark rooms, furiously typing code to break digital defenses. The reality, Professor Woodward states, is that most attacks aren't sophisticated at all. He explains that around 90% of successful hacks happen due to "social engineering" tactics. Here, individuals inadvertently give up their login details through phishing scams. Other vulnerabilities, such as weak passwords reused across multiple accounts and a lack of two-factor authentication, are also easy targets. 

"It's the equivalent of burglars going around rattling door handles – eventually they'll find one that's open," he told Metro.co.uk. "You could be successful in defending 99 times out of 100, but that one time that they get through, they can walk away with a lot of data." 

Protecting Yourself from State-Sponsored Hacking 

Professor Woodward emphasizes a classic cybersecurity mantra: "Assume nothing, believe no one, and check everything." This means exercising extreme caution whenever providing information online and staying vigilant against malicious emails or websites. Anti-virus software is another essential layer of basic protection. 

One crucial step is using a password manager. This eliminates the dangerous practice of using the same password for multiple accounts. "The best password is one you can't remember, so you really should have something like a password manager," he adds. "It will generate strong passwords and keep track of a different password for every account." 

Should You Be Worried? 

While the Electoral Commission breach is a serious incident, it's essential to remember that China's intentions are complex and may not be primarily focused on UK elections. Their broader campaign of global data collection hints at a more strategic play. Its precise aim is still unclear, but it underscores the need for individuals and nations alike to place a far greater emphasis on digital security. 

Past Breaches: A Glimpse into China's Hacking Operations 

In the past, the UK government has identified other Chinese-affiliated hacking groups as a threat. One notable example is APT10, which also goes by the names Stone Panda and Red Apollo. Experts believe this group maintains links to China's Ministry of State Security. As far back as 2018, the UK government warned that APT10 was behind "one of the most significant and widespread cyber intrusions against the UK and allies." According to Forbes, this group, active since at least 2009, has regularly used phishing and malware tactics to infiltrate organizations within the aerospace, defense, energy, and engineering sectors. 

These past incidents, coupled with the Electoral Commission breach, raise concerns that the UK may be a prime target for Chinese state-sponsored hacking. It highlights the urgent need for individuals, organisations, and the government to prioritize cybersecurity measures. 

The Electoral Commission Breach: A Legal and Ethical Dilemma 

The Electoral Commission has a legal obligation to notify individuals whose data has been compromised. Yet, they failed to disclose the breach to the public when it occurred. While delayed disclosures are not without precedent, it raises questions about transparency and the Electoral Commission's handling of the situation. 

Additionally, some have questioned the ethics of the Electoral Commission having a copy of the entire electoral register in a single, centralized location. Decentralizing such sensitive data could potentially help mitigate the impact of similar breaches in the future. 

Data Privacy in the Digital Age 

In recent years, several large-scale data breaches by corporations and governments have led to heightened public awareness about data privacy. With rapidly advancing technology, concerns about data use and protection will only intensify. The balance between national security and individual privacy is a continuous debate with no easy solutions. 

Governments, companies, and individuals share a responsibility to safeguard personal data. While absolute security guarantees are unrealistic, proactive measures can significantly minimize risks. 

What Steps Can Be Taken? 

Strengthening cybersecurity should be a top priority at all levels. Implementing these measures would help deter future attacks: 

Robust Passwords and Two-Factor Authentication: Password managers and enabling two-factor authentication on accounts make it exponentially harder for hackers to gain access. 

Cybersecurity Education: Organizations need to provide regular training for employees on how to recognize phishing attempts and other social engineering tactics. Similarly, the general public needs more education about online safety. 

Investment in Cybersecurity: Governments and businesses must allocate greater resources to cybersecurity infrastructure, as well as research and development of new defenses. 

Information Sharing and Collaboration: International cooperation is vital in combating cybercrime. Sharing threat intelligence across borders can help countries stay ahead of evolving attack methods. 

The Future of Cybersecurity: A Constant Battle 

The conflict between state actors and those seeking to protect digital assets is an ongoing arms race. It's highly likely that China and other countries will continue to refine their hacking methods. Therefore, vigilance, adaptation, and investment in robust defenses are crucial for the UK and the broader international community. 

The UK's Response: Balancing Security vs. Openness 

The government's official response to the Electoral Commission breach has been to impose sanctions on individuals and entities linked to APT31. This symbolic move signals that there are consequences for such actions. However, Professor Woodward remains skeptical about the effectiveness of sanctions on highly determined state actors. 

Critics argue that the UK government must adopt a more proactive and comprehensive approach to cybersecurity threats originating from China. Some suggest establishing a designated cyber security minister to coordinate a robust national strategy. 

Finding the right balance between security and preserving an open, digital economy is a continuous challenge for the UK and other Western democracies. There's growing pressure to restrict the involvement of Chinese companies, particularly Huawei, in critical UK infrastructure projects. The debate centers on weighing the potential benefits of collaboration against the risks of potential espionage or vulnerability to disruption. 

China's Global Ambitions and Cyber Warfare 

China's pursuit of technological dominance and its ambitions to reshape the global order cannot be ignored. The country's willingness to engage in cyberattacks to further its agenda is a hard reality for countries like the UK to confront. 

International relations experts caution that the UK needs to maintain a clear-eyed view of China as both an economic partner and a potential adversary. This will require a delicate balancing act, where cooperation in some areas is possible, while firm boundaries must exist in others. 

The Electoral Commission breach, while a concerning event in itself, should be seen within a much broader geopolitical context. It's a timely wake-up call for the UK and other nations to reassess their cybersecurity posture in an increasingly complex digital landscape. 

Is China Targeting Other Countries? 

The UK is not alone in facing cyberattacks and espionage efforts from China. Governments and organizations worldwide have reported similar attempts. The United States, with its vast economic and military power, is a frequent target of Chinese hacking groups. In 2015, the US Office of Personnel Management suffered a massive data breach, compromising the records of millions of government employees. Authorities attributed this attack to China. 

India, with its ongoing border tensions with China, has also reported numerous cyberattacks believed to originate from Chinese sources. Furthermore, Australia, a key US ally in the Pacific, has faced increasing aggression from China both economically and through suspected cyberwarfare operations. These incidents underscore the global reach and persistence of China's digital campaigns. 

The Need for a Unified Response 

While combating cyber threats is critical for individual nations, a unified international response would carry far greater weight. Developing shared standards for cybersecurity, coordinating investigations, and establishing clear consequences for state-sponsored hacking are essential. 

Alliances such as NATO, the Five Eyes intelligence network, and the recently formed AUKUS partnership (Australia, the UK, and the US) have vital roles to play in information sharing and developing joint defense strategies. The UK government has been actively working to strengthen these alliances. 

Conclusion 

The Electoral Commission breach is a chilling reminder of the vulnerabilities we all face in today's world. China's motivations, while not fully transparent, clearly include a relentless pursuit of data that can offer both strategic and tactical advantages. While the full implications of this breach may take time to become clear, the incident should catalyze a broader conversation about data privacy, cybersecurity, and the UK's evolving relationship with China. 

The Path Forward: Navigating a Changed World 

The digital landscape is evolving at a dizzying pace. The Electoral Commission breach highlights the urgent need for a multifaceted approach in this new era. Here are some vital areas to address: 

Education and Awareness: Every individual has a role to play. Raising awareness of cybersecurity best practices through public campaigns and targeted education can empower people to protect themselves. 

Investment and Innovation: Continuous investment in research, updated infrastructure, and developing a skilled cybersecurity workforce is essential to ensure national resilience and stay ahead of emerging threats. 

Cooperation and Regulation: Businesses must collaborate with the government, sharing information and adhering to robust cybersecurity standards. Evolving regulation will need to strike a balance between safeguarding critical data and enabling innovation. 

Deterrence and Accountability: Imposing meaningful consequences for cyberattacks from state actors is crucial. This requires diplomatic pressure, coordinated sanctions, and international agreements outlining acceptable behavior in cyberspace. 

Lingering Questions 

The Electoral Commission data breach leaves behind several important questions: 

China's Strategic Objective: What is China's primary goal with amassing massive amounts of data from the UK and other countries? Is it for immediate tactical use, long-term strategic advantage, or both? 

Individual vs. Collective Impact: How much does a breach like this truly matter for ordinary people? While the short-term risk to an individual may be low, should we be concerned about the cumulative risks of these campaigns on an entire country's democratic processes and economic stability? 

The Future of Data Ownership: Will individuals have more control over their data, or are we moving towards an inevitable erosion of digital privacy? These breaches bring questions about how personal information is collected, stored, and shared to the forefront. 

A Call for Engagement 

Technology is deeply woven into the fabric of modern life. While offering incredible benefits, it also presents undeniable risks. The Electoral Commission breach is an uncomfortable reminder, but it should not lead to apathy or fatalism. 

Citizens, businesses, and the government must all actively engage in discussions about cybersecurity, data privacy, and the evolving role of technology in society. Our future depends on striking a balance between technological progress and safeguarding essential freedoms. The UK's response to this challenge will help shape the digital world for generations to come. 

Final Thoughts 

The Electoral Commission hack has far-reaching implications beyond the borders of the UK. It underscores the critical need for a comprehensive cybersecurity strategy that addresses the threats posed by state actors as well as the importance of educating individuals and businesses about protecting themselves in the digital age. 

The future is undeniably uncertain, but proactive measures, public engagement, and international collaboration can help build a more secure and resilient world where the immense potential of technology is balanced with the protection of vital data, national interests, and democratic values. 

Do you want to join an online course
that will better your career prospects?

Give a new dimension to your personal life

to-top