26 October 2016
The massive security breach at the Office of Personnel Management compromised data on more than 22 million US federal workers. Photo: Internet
The massive security breach at the Office of Personnel Management compromised data on more than 22 million US federal workers. Photo: Internet

Hacking attack on US OPM not China-sponsored: Xinhua

An investigation into a massive US computer breach last year that compromised data on more than 22 million federal workers found that the hacking attack was criminal, not state-sponsored, the official Xinhua news agency said.

The breach at the US Office of Personnel Management (OPM) was among the cases discussed in a meeting between top US and Chinese officials on cyber security issues in Washington, the Xinhua report said.

The report did not give details of who conducted the investigation or whether both US and Chinese officials agreed with the conclusion. Reuters said.

The Cyberspace Administration of China, the country’s internet regulator, did not immediately reply to a request for comment.

In Washington, OPM referred inquiries to the US Department of Homeland Security, which also did not immediately respond to a request for comment.

White House spokesman Josh Earnest would not comment on the results of the US-Chinese talks but called the dialogue “an important step” toward addressing longstanding US concerns about Chinese cyber espionage.

US intelligence chief James Clapper in June said the OPM cyber attack was carried out by Chinese hackers but did not specifically accuse China’s government.

Clapper told a Washington intelligence conference: “You have to kind of salute the Chinese for what they did”, given the difficulty of the intrusion.

However, US officials have said privately they believe Chinese government entities were behind the breach, which involved the compromise of sensitive personal data submitted to OPM by applicants for US government security clearances, as well as field reports generated by security investigators.

The breach exposed the names, Social Security numbers and addresses of more than 22 million current and former US federal employees and contractors, as well as 5.6 million fingerprints.

John Hultquist, a cyber espionage expert with iSight Partners, said his firm believed the intrusion was conducted by hackers working for China’s government, based on digital evidence and the hackers’ other targets, including health insurer Anthem.

“We can’t attribute it directly to a specific intelligence organization or office building in Beijing, [but] the writing is on the wall in terms of the evidence we do have,” said Hultquist, whose firm provides cyber intelligence to the US government.

One reason US officials are reluctant to accuse the Chinese government publicly of hacking American security clearance data, officials and private experts have said, is that this is the sort of spying done by most if not all major foreign intelligence agencies including US agencies.

James Lewis, an expert with the Center for Strategic and International Studies think tank, said China’s latest claims suggest authorities are likely to say they have arrested hackers behind the OPM attack and claim they are criminals.

“It’s a face-saving way of saying, ‘It wasn’t us and we’ll put them in jail,’” Lewis said. “Traditional kabuki in espionage is you write off your agents when it’s politically useful to do so.”

Lewis said in October that shortly before Chinese president Xi Jinping visited the United States, Chinese officials told their American counterparts that Beijing had detained at least two hackers who breached US computer networks.

Reuters reported in October that Chinese officials told their US counterparts that one suspect was involved in the OPM breach.

– Contact us at [email protected]


EJI Weekly Newsletter