www.ncsc.gov.uk
Open in
urlscan Pro
3.160.150.126
Public Scan
URL:
https://www.ncsc.gov.uk/news/china-state-affiliated-actors-target-uk-democratic-institutions-parliamentarians
Submission: On March 25 via api from US — Scanned from DE
Submission: On March 25 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
You need to enable JavaScript to run this app. COOKIES ON THIS SITE We use some essential cookies to make this website work. We’d like to set additional cookies to understand how you use our website so we can improve our services. Accept optional cookies Reject optional cookies Manage Cookies (opens in a new tab) WRITTEN FOR This section shows the list of targeted audiences that the article is written for Close Skip to main content * ABOUT NCSC * CISP * REPORT AN INCIDENT * CONTACT US Search Menu HomeInformation for...Advice & guidanceEducation & skillsProducts & servicesNews, blogs, events... news Download / Print article PDF SHARE Copied to clipboard SHARE FACEBOOK LINKEDIN TWITTER COPY LINK Copied to clipboard SHARE FACEBOOK LINKEDIN TWITTER COPY LINK UK CALLS OUT CHINA STATE-AFFILIATED ACTORS FOR MALICIOUS CYBER TARGETING OF UK DEMOCRATIC INSTITUTIONS AND PARLIAMENTARIANS APT31, a China state-affiliated actor, was almost certainly responsible for targeting UK parliamentarians’ emails in 2021. Invalid DateTime * GCHQ’s National Cyber Security Centre assesses China state-affiliated actor APT31 was almost certainly responsible for targeting UK parliamentarians’ emails in 2021. * The compromise of the UK Electoral Commission’s systems has also been attributed to a China state-affiliated actor in a separate instance of malicious activity. * Organisations and individuals involved in democratic processes urged to follow NCSC advice to bolster their security in face of cyber threats. The UK government has called out China state-affiliated actors today (Monday) for carrying out malicious cyber activity targeting UK institutions and individuals important to our democracy. The National Cyber Security Centre – a part of GCHQ – assesses that the China state-affiliated cyber actor APT31 was almost certainly responsible for conducting online reconnaissance activity in 2021 against the email accounts of UK parliamentarians, most of whom have been prominent in calling out the malign activity of China. Separately, the compromise of computer systems at the UK Electoral Commission between 2021 and 2022 has also been attributed to a China state-affiliated actor. The NCSC assesses it is highly likely the threat actors accessed and exfiltrated email data, and data from the Electoral Register during this time. The data, in combination with other data sources, would highly likely be used by the Chinese intelligence services for a range of purposes, including large-scale espionage and transnational repression of perceived dissidents and critics in the UK. To help bolster the UK’s cyber resilience, the NCSC has today published updated guidance in its Defending Democracy collection for political organisations – such as parties and thinktanks – and organisations coordinating the delivery of elections, with advice on how to reduce the likelihood of cyber attacks. Paul Chichester, NCSC Director of Operations, said: “The malicious activities we have exposed today are indicative of a wider pattern of unacceptable behaviour we are seeing from China state-affiliated actors against the UK and around the world. “The targeting of our democratic system is unacceptable and the NCSC will continue to call out cyber actors who pose a threat to the institutions and values that underpin our society. “It is vital that organisations and individuals involved in our democratic processes defend themselves in cyberspace and I urge them to follow and implement the NCSC’s advice to stay safe online.” The cyber campaign against the parliamentary email accounts of members across both Houses of Parliament was identified and successfully mitigated by Parliament’s Security Department before any accounts could be compromised. The compromise of systems at the UK Electoral Commission was made public last year after steps had been taken to remediate and recover, with support from the NCSC. The publication of new Defending Democracy guidance follows the release of fresh advice for high-risk individuals published in December. The newly issued guidance for political organisations offers advice to help IT practitioners implement security measures that will help prevent common cyber attacks. These include: putting controls in place to defend against spear-phishing and DDoS attacks and setting up multi-factor authentication on cloud- and internet-connected services. Meanwhile the guidance for organisations involved in coordinating elections, such as local authorities, advises on steps to take to protect electoral management systems. The NCSC has previously warned about the threat from China state-linked cyber capabilities, including from APT31 which was previously linked to the Chinese Ministry of State Security in 2021 following compromise of Microsoft Exchange Server. More recently, the NCSC has warned about China state-sponsored actors using living off the land techniques to evade detection on compromised critical infrastructure networks. The UK government attribution statement can be read on GOV.UK. FURTHER GUIDANCE ON DEFENDING DEMOCRACY The NCSC's Defending Democracy collection brings together expanded guidance to raise awareness of the cyber threats to democratic processes, institutions, and the people involved in them. The aim is to prevent or reduce related attacks against both organisations and individuals. View NCSC's guidance on Defending Democracy TOPICS Cyber threat Back to top Download / Print article PDF SHARE Copied to clipboard SHARE FACEBOOK LINKEDIN TWITTER COPY LINK Copied to clipboard SHARE FACEBOOK LINKEDIN TWITTER COPY LINK * PUBLISHED * 25 March 2024 * WRITTEN FOR * Large organisations * Public sector * Cyber security professionals * NEWS TYPE * General news * PUBLISHED * 25 March 2024 * WRITTEN FOR * Large organisations * Public sector * Cyber security professionals * NEWS TYPE * General news Back to top ALSO SEE NEWS * 26 February 2024 SVR CYBER ACTORS ADAPT TACTICS FOR INITIAL CLOUD ACCESS How SVR-attributed actors are adapting to the move of government and corporations to cloud infrastructure. NEWS * 26 February 2024 UK AND ALLIES EXPOSE EVOLVING TACTICS OF RUSSIAN CYBER ACTORS New advisory reveals evolving tactics used by Russian state-linked cyber actors as more organisations move to cloud-based infrastructure. BLOG POST * 15 February 2024 FROM THE CYBER PROLIFERATION THREAT ALL THE WAY TO PALL MALL The first dedicated conference on this topic – and an insight into the NCSC assessment work behind it. FOLLOW US * * * * * ABOUT NCSC * What we do * What is cyber security? * Equality, diversity and inclusion * Incident management * Leadership team * Careers INFORMATION FOR... * Individuals & families * Self employed & sole traders * Small & medium sized organisations * Large organisations * Public sector * Cyber security professionals ADVICE & GUIDANCE * All topics * All articles * Cyber Aware EDUCATION & SKILLS * Schools * Higher education * Professional skills & training * Working with the NCSC * CyBOK * Research & Academia * CyberFirst PRODUCTS & SERVICES * Overview * Browse products & services * Verify a supplier * NCSC certification * Evaluation partners * Cyber Essentials * Active Cyber Defence (ACD) KEEP UP TO DATE * CYBERUK * NCSC blog * NCSC news * Reports & advisories * Speeches * Subscribe ABOUT THIS WEBSITE * Privacy notice * Cookies * Accessibility * Terms & conditions * Social media policy USEFUL LINKS * GCHQ * MI5 * SIS * NPSA * GOV.UK CONTACT THE NCSC * General enquiries * Media Centre * Report an incident * Report a vulnerability * Report phishing scam * Verify an NCSC contact SEARCH Search POPULAR SEARCHES Cyber Aware Cyber Essentials CYBERUK Passwords Phishing Ransomware