UK blames China for Microsoft Exchange Server attack
Dominic Raab calls on the Chinese government to put an end to this "systematic cyber sabotage"


The UK government has accused China of being behind the Microsoft Exchange Server attack that is estimated to have affected more than a quarter of a million servers worldwide, of which 7,000 were based in the UK.
First reported in early March, the attack was found to have been led by state-backed hackers, specifically the Chinese-based Hafnium and at least 10 other hacking groups.
The UK government has now formally accused the Chinese Ministry of State Security of being behind the attack, claiming it ordered Hafnium, APT31, and APT40, also known as Leviathan, to orchestrate it.
It, along with counterparts in Europe and the US, also accused the Chinese government of ignoring “repeated calls to end its reckless campaign, instead allowing its state-backed actors to increase the scale of their attacks and act recklessly when caught” and urged it “to take responsibility for its actions and respect the democratic institutions, personal data and commercial interests of those with whom it seeks to partner”.
This includes reaffirming its 2015 commitment to “not to conduct or support cyber-enabled theft of intellectual property of trade secrets”.
Commenting on the announcement, foreign secretary Dominic Raab described the attack as “a reckless but familiar pattern of behaviour”.
RELATED RESOURCE
“The Chinese government must end this systematic cyber sabotage and can expect to be held account [sic] if it does not,” he said.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The EU joined the UK in condemning the Chinese government for the Exchange attack, stating that APT31 and APT40’s “irresponsible and harmful behaviour” had affected its “economy, security, democracy and society at large”.
“The EU and its member states strongly denounce these malicious cyber activities, which are undertaken in contradiction with the norms of responsible state behaviour as endorsed by all UN member states. We continue to urge the Chinese authorities to adhere to these norms and not allow its territory to be used for malicious cyber activities, and take all appropriate measures and reasonably available and feasible steps to detect, investigate and address the situation,” the EU Council said.
It also stated that it would “continue to enhance our cooperation, including with international partners and other public and private stakeholders, through increased exchange of information and continued diplomatic engagement, by strengthening cyber resilience and incident handling cooperation, as well as through joint efforts to improve the overall security of software and their supply chains”.
Having only graduated from City University in 2019, Sabina has already demonstrated her abilities as a keen writer and effective journalist. Currently a content writer for Drapers, Sabina spent a number of years writing for ITPro, specialising in networking and telecommunications, as well as charting the efforts of technology companies to improve their inclusion and diversity strategies, a topic close to her heart.
Sabina has also held a number of editorial roles at Harper's Bazaar, Cube Collective, and HighClouds.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan