Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Breaches

Czech Government Condemns Chinese Hack on Critical Infrastructure

The Czech government issues a blunt warning to China after APT31 hackers linked to intrusion at critical infrastructure network.

China's Salt Typhoon hacks US telecoms firms

The Czech government delivered a pointed warning to China on Wednesday, publicly attributing a years-long intrusion in the foreign ministry’s networks to APT31, a cyber-espionage hacking unit linked to Beijing’s Ministry of State Security. 

In a blunt statement, the Czech government said the hackers broke into one of the ministry’s unclassified systems as early as 2022 and lingered undetected inside critical-infrastructure networks, prompting what officials called a “high-degree of certainty” attribution after a joint probe by the country’s civilian and military intelligence services.

“The Government of the Czech Republic strongly condemns this malicious cyber campaign against its critical infrastructure,” the statement read. “Such behavior undermines the credibility of the People’s Republic of China and contradicts its   public declarations.”

The Prague statement described the Chinese hacking as “contrary to the norms of responsible State behaviour in cyberspace as endorsed by all UN Members.”

“We call on the People’s Republic of China to adhere to these norms and principles, to refrain from such attacks and to take all appropriate measures  to address this situation,” the Czech government added.

The statement did not include any technical details on the intrusions or what was stolen, but public reports say the affected systems have since been rebuilt and isolated.

The European Union issued a separate statement condemning the APT31 activity and warned that Chinese hackers have ramped up attacks against member states.

“We strongly condemn malicious cyber activities,” the EU said. “We call upon all states, including China, to refrain from such behaviour, to respect international law and to adhere to the UN norms and principles, including those related to critical infrastructure.”

Advertisement. Scroll to continue reading.

The EU also noted that states should not allow their territory to be used for malicious cyber activities.

APT31, also known as Zirconium or Judgment Panda, has been operational for more than a decade, stealing diplomatic cables, industrial designs, and political strategy documents from Europe, North America, and Asia. 

Last year the United States and United Kingdom unsealed criminal charges and sanctions against members of the group for what prosecutors described as a broad effort to “facilitate the MSS’s political-and economic-intelligence objectives.”

The US Department of the Treasury’s Office of Foreign Assets Control (OFAC) has  slapped sanctions on hackers linked to APT31 and Wuhan, a China-based technology company serving as a front for multiple malicious cyber operations.  

Related: US Treasury Slaps Sanctions on China-Linked APT31 Hackers

Related: Chinese Cyberspy Group APT31 Starts Targeting Russia

Related: China-Linked APT31 Abuses Hacked Routers in Attacks, France Warns 

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Coro, a provider of cybersecurity solutions for SMBs, has appointed Joe Sykora as CEO.

SonicWall has hired Rajnish Mishra as Senior Vice President and Chief Development Officer.

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.