Microsoft failed to notify Hotmail users of 2011 hacking by Chinese government – Tribune-Review
SAN FRANCISCO Ã¢â¬” Microsoft Corp. experts concluded several years ago that Chinese authorities had hacked into more than a thousand Hotmail email accounts, targeting international leaders of China’s Tibetan and Uighur minorities in particular Ã¢â¬” but decided not to tell the victims, allowing the hackers to continue their campaign, according to former employees of the company.
On Wednesday, after a series of requests for comment from Reuters, Microsoft said it will change its policy and will tell its email customers when it suspects there has been a government hacking attempt.
Microsoft spokesman Frank Shaw said the company was never certain of the origin of the Hotmail attacks.
The company also confirmed for the first time that it had not called, emailed or otherÃÂwise told the Hotmail users that their electronic correspondence had been collected. The company declined to say what role the exposure of the Hotmail campaign played in its decision to make the policy shift.
The first public signal of the attacks came in May 2011, though no direct link was immediately made with the Chinese authorities. That’s when security firm Trend Micro Inc. announced it had found an email sent to someone in Taiwan that contained a miniature computer program.
The program took advantage of a previously undetected flaw in Microsoft’s web pages to direct Hotmail and other free Microsoft email services to secretly forward copies of all of a recipient’s incoming mail to an account controlled by the attacker.
Trend Micro found more than a thousand victims, and Microsoft patched the vulnerability before the security company announced its findings publicly.
Microsoft launched its own investigation that year, finding that some interception had begun in July 2009 and compromised the emails of top Uighur and Tibetan leaders in multiple countries, as well as Japanese and African diplomats, human rights lawyers and others in sensitive positions inside China, two former Microsoft employees said. They spoke separately and on the condition that they not be identified.
Some of the attacks had come from a Chinese network known as AS4808, which has been associated with major spying campaigns, including a 2011 attack on EMC Corp.’s security division RSA that U.S. intelligence officials publicly attributed to China.
Microsoft officials did not dispute that most of the attacks came from China but said some came from elsewhere. They did not give further detail.
Ã¢â¬œWe weighed several factors in responding to this incident, including the fact that neither Microsoft nor the U.S. government were able to identify the source of the attacks, which did not come from any single country,Ã¢â¬ï¿½ the company said. Ã¢â¬œWe also considered the potential impact on any subsequent investigation and ongoing measures we were taking to prevent potential future attacks.Ã¢â¬ï¿½
In announcing the new policy, Microsoft said: Ã¢â¬œAs the threat landscape has evolved, our approach has too, and we’ll now go beyond notification and guidance to specify if we reasonably believe the attacker is Ã¢â¬˜state-sponsored.’ Ã¢â¬ï¿½
Requests for comment from China’s Foreign Ministry and the Cyberspace Administration of China were not immediately answered. The Chinese government routinely issues strong denials of involvement in all hacking activities.
After a vigorous internal debate in 2011 that reached Microsoft’s top security official, Scott Charney, and its then-general counsel and now president, Brad Smith, the company decided not to alert the users clearly that anything was amiss, the former employees said. Instead, it simply forced users to pick new passwords without disclosing the reason.
The employees said it was likely the hackers by then had footholds in some of the victims’ machines and therefore saw those new passwords being entered.
One of the reasons Microsoft executives gave internally in 2011 for not issuing explicit warnings was their fear of angering the Chinese government, two people familiar with the discussions said.
Microsoft’s statement did not address the specific positions advocated by Smith and Charney. A person familiar with the executives’ thinking said that fear of Chinese reprisals did play a role given the company’s concerns about the potential impact on customers.
Microsoft said the company had believed the password resets would be the fastest way to restore security to the accounts.
Ã¢â¬œOur primary concern was ensuring that our customers quickly took practical steps to secure their accounts, including by forcing a password reset,Ã¢â¬ï¿½ the statement said.
It is unclear what happened to the email users and their correspondents as a result of Microsoft’s failure to alert them to the suspected government hacking. But some of those affected said they were now deeply worried about the risks, especially for those inside China.
Ã¢â¬œThe Internet service providers and the email providers have an ethical and a moral responsibility to let the users know that they are being hacked,Ã¢â¬ï¿½ said Seyit Tumturk, vice president of the World Uyghur Congress, whose account was among those compromised. Ã¢â¬œWe are talking in people’s lives here.Ã¢â¬ï¿½