scorecardresearch Skip to main content

Spike in hacking of US networks is said to be tied to China and Iran

US Deputy Attorney General Rod Rosenstein spoke at a press conference in Washington about Chinese hacking on Dec. 20. Nicholas Kamm/AFP/Getty Images/File/AFP/Getty Images

SAN FRANCISCO — US businesses and government agencies have been targeted in aggressive attacks by Iranian and Chinese hackers who security experts believe have been energized by President Trump’s withdrawal from the Iran nuclear deal last year and his trade conflicts with China.

Recent Iranian attacks on banks, businesses, and government agencies have been more extensive than previously reported. Dozens of corporations and multiple US agencies have been hit, according to seven people briefed on the episodes who were not authorized to discuss them publicly.

The attacks, attributed to Iran by National Security Agency analysts and the security firm FireEye, prompted an emergency order by the Department of Homeland Security during the government shutdown last month.


The Iranian attacks coincide with a renewed Chinese offensive geared to stealing trade and military secrets from US military contractors and technology companies, according to nine intelligence officials, private security researchers, and lawyers familiar with the attacks who discussed them on the condition of anonymity.

A summary of an intelligence briefing read to The New York Times said Boeing, General Electric Aviation, and T-Mobile were among the recent targets of Chinese industrial-espionage efforts. The companies all declined to discuss the threats, and it is not clear if any of the hacks were successful.

Chinese cyberespionage cooled four years ago after President Barack Obama and President Xi Jinping of China reached a landmark deal to stop hacks meant to steal trade secrets.

But the 2015 agreement appears to have been unofficially canceled amid trade tension between the United States and China, the intelligence officials and private security researchers said. Chinese hacks have returned to earlier levels, although they are now stealthier and more sophisticated.

“Cyber is one of the ways adversaries can attack us and retaliate in effective and nasty ways that are well below the threshold of an armed attack or laws of war,” said Joel Brenner, a former leader of US counterintelligence under the director of national intelligence.


Federal agencies and private companies are back to where they were five years ago: battling increasingly sophisticated, government-affiliated hackers from China and Iran — in addition to fighting constant efforts by Russians who hope to steal trade and military secrets and sow mayhem.

Russia is still considered America’s foremost hacking adversary. In addition to meddling widely and spreading disinformation during US elections, Russian hackers are believed to have attacked nuclear plants, the electrical grid, and other targets.

Threats from China and Iran never stopped entirely, but Iranian hackers became much less active after the nuclear deal was signed in 2015. And for about 18 months, intelligence officials concluded, Beijing backed off its 10-year online effort to steal trade secrets.

But Chinese hackers have resumed carrying out commercially motivated attacks, security researchers and data-protection lawyers said. A priority for the hackers, researchers said, is supporting Beijing’s five-year economic plan, which is meant to make China a leader in artificial intelligence and other cutting-edge technologies.

“Some of the recent intelligence collection has been for military purposes or preparing for some future cyber conflict, but a lot of the recent theft is driven by the demands of the five-year plan and other technology strategies,” said Adam Segal, director of the cyberspace program at the Council on Foreign Relations. “They always intended on coming back.”

Officials at the Chinese Embassy did not respond to a request for comment.


Segal and other Chinese security experts said attacks that once would have been conducted by hackers in China’s People’s Liberation Army are now being run by China’s Ministry of State Security.

These hackers are better at covering their tracks. Rather than go at targets directly, they have used a side door of sorts by breaking into the networks of the targets’ suppliers. They have also avoided using malware commonly attributed to China, relying on encrypting traffic, erasing server logs, and other obfuscation tactics.

“The fingerprint of Chinese operations today is much different,” said Priscilla Moriuchi, who once ran the National Security Agency’s East Asia and Pacific cyber threats division. Her duties there included determining whether Beijing was abiding by the 2015 agreement’s terms. “These groups care about attribution. They don’t want to get caught.”

Federal agencies are also trying to fend off new Iranian espionage campaigns.

After the Trump administration pulled out of the nuclear deal, Kirstjen Nielsen, the homeland security secretary, told Congress her agency was “anticipating it’s a possibility” Iran would resort to hacking.

The Iranian attacks, which hit more than a half-dozen federal agencies last month, still caught the department off guard. Researchers said the hacks, which exploited underlying weaknesses in the Internet’s backbone, were continuing and were more damaging and widespread than agency officials had acknowledged.

Iranian hackers began their latest wave of attacks in Persian Gulf states last year. Since then, they have expanded to 80 targets — including Internet service providers, telecommunications companies and government agencies — in 12 European countries and the United States, according to FireEye, which first reported the attacks last month.


The current hacks are harder to catch. Instead of hitting victims directly, FireEye researchers said, Iranian hackers have been going after the Internet’s core routing system, intercepting traffic between so-called domain name registrars. Once they intercepted their target’s customer Web traffic, they used stolen login credentials to access victims’ e-mails. (The registrars hold the keys to hundreds, perhaps thousands, of companies’ websites.)

“They’re taking whole mailboxes of data,” said Benjamin Read, a senior manager of cyberespionage analysis at FireEye. Read said Iranian hackers had targeted police forces, intelligence agencies, and foreign ministries, indicating a classic state-backed espionage campaign rather than a criminal, profit-seeking motive.

There is a long history of Iranian attacks against the United States, and episodes from five years back or longer are just now being made public.

Representatives of Iran’s Mission to the United Nations did not respond to requests for comment.

The recent Iranian attacks have unnerved US officials. But after issuing the emergency order about the ones last month, the Department of Homeland Security has largely played them down.

An official with the cybersecurity agency said there was a belief that no information had been stolen and that the attacks had not “materially impacted” operations. But Read of FireEye and others said there had been a noticeable escalation in Iran’s digital espionage.

“If you tell the Iranians you’re going to walk out on the agreement and do everything you can to undermine their government,” said Brenner, the former counterintelligence official, “you can’t be surprised if they attack our government networks.”