Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

All Governments Hack Secret Data: Huawei

SYDNEY – Using the Internet to spy and steal sensitive data is standard practice by all countries, according to the security chief of controversial Chinese telecoms giant Huawei.

SYDNEY – Using the Internet to spy and steal sensitive data is standard practice by all countries, according to the security chief of controversial Chinese telecoms giant Huawei.

The comments published Wednesday follow allegations that Chinese hackers gained access to secret designs for a slew of sophisticated US weapons programs, and stole the blueprints for Australia’s new intelligence agency headquarters.

John Suffolk, a former chief information officer with the British government and now head of security operations at Huawei, said he was not surprised by claims of international hacking.

Huawei Logo

“Governments have always done that,” he told the Australian Financial Review, adding that the “harsh reality is every government around the world has a similar strap-line for their security agencies”.

“Some people say that spying is the second-oldest profession, where people have tried to get information off us for somebody else, so I don’t think anyone is surprised that any government around the world is trying to find out what other governments around the world are doing.

“Governments have to really focus on what quiet steps they’re going to take, accepting no government will really trust 100 percent another government, regardless of the laws, the policies and procedures,” he added.

Confirming a Washington Post story, US officials said Tuesday that Chinese hackers had breached networks containing designs for an array of advanced US weapons projects, from stealth-fighter jets to missile defence systems.

The Australian Broadcasting Corporation said documents taken in a cyber hit on the spy headquarters included cable layouts for the security and communications systems, its floor plan and its server locations.

Advertisement. Scroll to continue reading.

Beijing has yet to comment on the latest US claims, but called the ABC accusations groundless.

Huawei has been at the center of cyber-espionage concerns itself, with the US Congress last year raising fears that its ties with Beijing meant telecom equipment supplied by the company could be used for spying.

Congress called for its exclusion from US government contracts and acquisitions.

Australia has also barred the firm from involvement in its new national broadband network because of security concerns.

Suffolk said Huawei was a “piggy in the middle” of the broader dispute over hacking between China and the United States.

Related: Huawei Founder Breaks Silence to Reject Security Concerns

Related: PLA Concerns Lead to Huawei Being Blocked in Australia 

RelatedHuawei Calls for Global Security Standards

RelatedChina’s Huawei Responds to US Hackers

Related: China’s Huawei to Curb Business In Iran

Insight: A Convenient Scapegoat – Why All Cyber Attacks Originate in China

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...