• Research
  • Politika
  • About
Carnegie Russia Eurasia center logoCarnegie lettermark logo
  • Donate
{
  "authors": [
    "Nick Beecroft"
  ],
  "type": "commentary",
  "centerAffiliationAll": "dc",
  "centers": [
    "Carnegie Endowment for International Peace"
  ],
  "collections": [
    "Major Power Tech Relations"
  ],
  "englishNewsletterAll": "ctw",
  "nonEnglishNewsletterAll": "",
  "primaryCenter": "Carnegie Endowment for International Peace",
  "programAffiliation": "TIA",
  "programs": [
    "Technology and International Affairs"
  ],
  "projects": [],
  "regions": [
    "East Asia",
    "China",
    "Iran"
  ],
  "topics": [
    "Technology"
  ]
}

Source: Getty

Commentary

To Condemn Chinese Hacks, Hate the Game Not Just the Players

In calling out China’s involvement in cyber attacks on Microsoft email servers, the United States and its allies missed a chance to preempt Beijing’s tit-for-tat response. Here’s how they could regroup.

Link Copied
By Nick Beecroft
Published on Jul 23, 2021

The simultaneous condemnation of Chinese cyber attacks by the Five Eyes allies (Australia, Canada, New Zealand, the UK, and the United States) plus the EU, NATO, and Japan was an unprecedented moment of unity in calling out unacceptable behavior in cyberspace. Nevertheless, Beijing fell back on its standard response to public attribution of state-sponsored cyber attacks, dismissing the criticism as “groundless accusations out of thin air” while accusing the United States of even worse behavior.

To generate real momentum toward red lines and a broader consensus on how states should exercise power in cyberspace, the reproof should be used as an opportunity to give substance to the UN norms recently agreed by twenty-five states, including China.

A Missed Opportunity

The Microsoft Exchange attack was most likely the catalyst for the allies presenting a united front. While the public statements varied in emphasis, all identified threat actors linked to the Chinese Ministry of State Security as the perpetrators of a mass exploitation of vulnerabilities in Microsoft Exchange Server in early 2021. The UK described the operation as “systematic cyber sabotage” that was part of a “reckless but familiar pattern of behavior.”

Unfortunately, the statements stopped there, falling short of identifying specifically why the Microsoft attack warranted an unprecedented public rebuke. It is reasonable to assume that they were motivated by the systemic importance of email to the functioning of modern economies and societies, coupled with the indiscriminate nature of the attack. If that was the case, there was a missed chance to test the application of the cyber norms that China has endorsed through the UN Group of Governmental Experts (GGE).

Why Attacking Email Is So Damaging

The May 2021 GGE report showcased agreement to a norm (13i) that “states should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of information and communications technology (ICT) products.” The Microsoft attack breached tens of thousands of machines and networks worldwide, exposing organizations because of their reliance on particular email servers. Arguably, this incident presents a powerful test of the international consensus against indiscriminate supply chain attacks. Had the allies made this a central component of their complaint, Beijing would have found it harder to dismiss the allegations with its standard rhetoric.

Government Hacks By Day, Cyber Crime By Night

Beyond the Microsoft attack, the statements only aligned on the general condemnation of China’s behavior in cyberspace. But the GGE has produced agreements that could have further supported other aspects of the complaints. For example, the United States was alone in highlighting “unsanctioned” criminal activity for personal profit by Chinese government-affiliated cyber operators. While the other parties chose not to highlight this in their statements, the threat from actors who hack for the Chinese state by day and for their own criminal gain by night is well understood—the cyber crime group APT41 is a prominent example.

The GGE process has created norms against enabling criminal activity: the GGE’s 2015 report reached an agreement that “states should not knowingly allow their territory to be used for internationally wrongful acts using ICT.” The allies missed an opportunity to test that norm and root the accusation within an international consensus, if only to test the Chinese interpretation of the GGE norms it has signed on to.

Condemn the Act, Not Just the Perpetrators

Public attribution of cyber attacks clearly antagonizes Chinese leaders, who see it as part of a concerted campaign of multi-pronged hostility from Washington and U.S. allies. Accusations of irresponsible behavior in cyberspace by Chinese state actors are therefore framed and dismissed as a product of hostility to China. If public naming and shaming is to serve a strategic purpose beyond addressing domestic political audiences, it should focus on the characteristics of the unacceptable behavior, rather than solely its perpetrators.

The U.S. statement described indiscriminate supply chain attacks, criminal activities by state operatives, and theft of intellectual property as unacceptable. If the United States and its allies wish to establish red lines around these activities, their assessments should characterize specific forms of behavior as unacceptable, according to universally agreed principles. That way, Washington could achieve its strategic goals through a multinational consensus. The alternative is tit-for-tat rhetoric, which allows public attribution to be easily dismissed as a political blunt instrument.

About the Author

Nick Beecroft

Former Nonresident Scholar, Technology and International Affairs Program

Nick Beecroft was a nonresident scholar in the Technology and International Affairs Program at the Carnegie Endowment.

    Recent Work

  • Q&A
    What the Russian Invasion Reveals About the Future of Cyber Warfare
      • Jon Bateman

      Jon Bateman, Nick Beecroft, Gavin Wilde

  • Article
    Evaluating the International Support to Ukrainian Cyber Defense

      Nick Beecroft

Nick Beecroft
Former Nonresident Scholar, Technology and International Affairs Program
Nick Beecroft
TechnologyEast AsiaChinaIran

Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.

More Work from Carnegie Russia Eurasia Center

  • Commentary
    Carnegie Politika
    Is There a Place for Russia in the New Race Back to the Moon?

    Despite having the resources and expertise, the Russian space industry missed the opportunity to offer the United States or China a mutually rewarding partnership in the lunar race.

      Georgy Trishkin

  • Commentary
    Carnegie Politika
    Power, Pathways, and Policy: Grounding Central Asia’s Digital Ambitions

    Central Asia’s digital ambitions are achievable, but only if policy is aligned with the region’s physical constraints.

      Aruzhan Meirkhanova

  • Commentary
    Carnegie Politika
    Conspiracy Theories Are Eclipsing the Real Dangers of Russia’s Messaging App Max

    The internet is awash not only with instructions from digital security experts, but also with urban legends and conspiracy theories that divert attention away from the real dangers of Max.

      David Frenkel

  • Commentary
    Carnegie Politika
    Blocking of Telegram App Sparks Rare Public Rift Among Russia’s Elites

    The prospect of a total block on Russia’s most popular messaging app has sparked disagreement between the regime’s political managers and its security agencies.

      Andrey Pertsev

  • Commentary
    Carnegie Politika
    What the Russian Energy Sector Stands to Gain From War in the Middle East

    The future trajectory of the U.S.-Iran war remains uncertain, but its impact on global energy trade flows and ties will be far-reaching. Moscow is likely to become a key beneficiary of these changes; the crisis in the Gulf also strengthens Russia’s hand in its relationships with China and India, where advantages might prove more durable.

      • Sergey Vakulenko

      Sergey Vakulenko

Get more news and analysis from
Carnegie Russia Eurasia Center
Carnegie Russia Eurasia logo, white
  • Research
  • Politika
  • About
  • Experts
  • Events
  • Contact
  • Privacy
  • For Media
Get more news and analysis from
Carnegie Russia Eurasia Center
© 2026 Carnegie Endowment for International Peace. All rights reserved.