• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Tech

China’s Microsoft hackers took unusually reckless turn, FireEye CEO says

By
Frank Bajak
Frank Bajak
,
Nathan Ellgren
Nathan Ellgren
, and
The Associated Press
The Associated Press
Down Arrow Button Icon
By
Frank Bajak
Frank Bajak
,
Nathan Ellgren
Nathan Ellgren
, and
The Associated Press
The Associated Press
Down Arrow Button Icon
March 10, 2021, 11:25 AM ET

Our mission to make business better is fueled by readers like you. To enjoy unlimited access to our journalism, subscribe today.

Cyber sleuths have already blamed China for a hack that exposed tens of thousands of servers running its Exchange email program to potential hacks. The CEO of a prominent cybersecurity firm says it now seems clear China also unleashed an indiscriminate, automated second wave of hacking that opened the way for ransomware and other cyberattacks.

The second wave, which began Feb. 26, is highly uncharacteristic of Beijing’s elite cyber spies and far exceeds the norms of espionage, said Kevin Mandia of FireEye. In its massive scale it diverges radically from the highly targeted nature of the original hack, which was detected in January.

“You never want to see a modern nation like China that has an offense capability—that they usually control with discipline—suddenly hit potentially a hundred thousand systems,” Mandia said Tuesday in an interview with The Associated Press.

Mandia said his company assesses based on the forensics that two groups of Chinese state-backed hackers—in an explosion of automated seeding—installed backdoors known as “web shells” on an as-yet undetermined number of systems. Experts fear a large number could easily be exploited for second-stage infections of ransomware by criminals, who also use automation to identify and infect targets.

Across the globe, cybersecurity teams are scrambling to identify and shore up hacked systems. The National Governors Association sent a rare alert to governors on Tuesday asking them amplify “both the severity of the threat and the next steps” local governments, businesses and operators of critical infrastructure should take.

David Kennedy, CEO of the cybersecurity firm TrustedSec, tweeted Tuesday that resource-demanding programs that “mine” cryptocurrencies were being installed on some compromised Exchange servers.

The White House has called the overall hack an “active threat,” but so far has not urged tough action against China or differentiated between the two waves—at least not publicly. Neither the White House nor the Department of Homeland Security offered immediate comment on whether they attribute the second wave to China.

The assessment of Mandia, who has been dealing with Chinese state-backed hackers since 1995 and has long had the ear of presidents and prime ministers, squares with that of Dmitri Alperovitch, former chief technical officer of CrowdStrike, the other cybersecurity powerhouse in the Washington, D.C., area. Alperovitch says China needs to be immediately put on notice: Shut down those web shell implants and limit collateral.

The explosion of automated backdoor-creating hacks began five days before Microsoft issued a patch for the vulnerabilities first detected in late January by the cybersecurity firm Volexity. It had found evidence of the vulnerabilities being used as far back as Jan. 3 by Chinese state-backed hackers, who researchers say targeted think tanks, universities, defense contractors, law firms and infectious-disease research centers.

Suddenly, all manner of organizations that run email servers were infected with web shells associated with known Chinese groups, who—knowing the patch was imminent—rushed to hit everything they could, said Mandia.

“They could sense it was going to end-of-life soon, so they just went wild. They machine gun-fired down the stretch,” he said in an interview in FireEye’s offices.

It’s possible the second infection wave was not approved at the highest levels of China’s government,” Mandia said.

“This doesn’t feel consistent with what they normally do,” he said. “A lot of times there’s a disconnect between senior leadership and front-line folks. All I can tell you is it was surprising to me to see four ‘zero days’ wantonly exploited,” adding, “If you could be exploited by this act, for the most part, you were.”

“Zero days” are vulnerabilities that hackers discover and use to pry open secret doors in software. Their name derives from the countdown to patching that begins after they are deployed. In this case, it took Microsoft 28 days to produce a patch once it was notified.

Mandia cautioned that the mass hack is not apt to trigger any critical infrastructure failures or cost lives. “It’s not going to draw blood.” But it highlights how there are no rules of engagement in cyberspace, something governments urgently need to address “before something catastrophic happens.”

Asked for comment on Monday about allegations it was behind the hack, the Chinese Embassy in Washington pointed to remarks last week from Foreign Ministry spokesperson Wang Wenbin saying that China “firmly opposes and combats cyber attacks and cyber theft in all forms.” He said attribution of cyberattacks should be based on evidence and not “groundless accusations.”

Mandia compared the Exchange hack with the SolarWinds hacking campaign that Washington has blamed on elite Russian intelligence agents that his company discovered in December.

“The SolarWinds attack was very surreptitious, very stealthy, very focused. The operator showed restraint and they went deep not wide,” said Mandia, who appeared in multiple Capitol Hill hearings on SolarWinds. “This attack (Exchange) feels very wide, but what I don’t have an answer to yet is just how deep it is.”

U.S. officials say at least nine federal agencies and over 100 private sector targets were affected by the SolarWinds campaign, named after the Texas company whose network management software was used to seed malware to more than 18,000 customers. Only a small number were hacked during the campaign, which went eight months without being detected.

Mandia said Russian intelligence operatives had manually penetrated the networks of between 60 and 100 different victims. Security researchers say telecommunications and software companies and think tanks were especially hard hit.

More must-read tech coverage from Fortune:

  • Fitbit’s first product since being acquired by Google is just for kids
  • How Clubhouse is engaging with Native American communities
  • One year later: 15 ways life has changed since the onset of the COVID pandemic
  • Commentary: Disinformation attacks are spreading. 4 keys to protecting your company
  • T-Mobile wants to share your data with advertisers. Here’s how to opt out
About the Authors
By Frank Bajak
See full bioRight Arrow Button Icon
By Nathan Ellgren
See full bioRight Arrow Button Icon
By The Associated Press
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

Young man working on laptop with headphones in modern coffeeshop
Future of Workskills gap
AI generated identical résumés for a man and a woman: Hers was more likely to be labeled ‘weak,’ while his got a 97% approval rating
By Eleanor PringleMay 10, 2026
2 hours ago
UFO files show Buzz Aldrin saw a ‘sizeable’ object close to the moon and a ‘fairly bright light source’ that the Apollo 11 crew felt could be a laser
Innovationspace
UFO files show Buzz Aldrin saw a ‘sizeable’ object close to the moon and a ‘fairly bright light source’ that the Apollo 11 crew felt could be a laser
By Seung Min Kim, Collin Binkley and The Associated PressMay 9, 2026
20 hours ago
joaquin
Commentary250 Years of Innovation
Johnson & Johnson CEO: America’s innovation advantage starts with health 
By Joaquin DuatoMay 9, 2026
23 hours ago
Qualcomm’s CEO is working with ‘pretty much all’ major AI players on top-secret devices—and powering OpenAI’s first push into hardware
AIQualcomm
Qualcomm’s CEO is working with ‘pretty much all’ major AI players on top-secret devices—and powering OpenAI’s first push into hardware
By Eva RoytburgMay 9, 2026
24 hours ago
reed
CommentaryRetirement
Tim Cook and Reed Hastings just showed every CEO how to leave gracefully
By Paul HardartMay 9, 2026
1 day ago
Companies are abandoning ‘peanut butter’ raises as pay-for-performance takes over the workplace in the AI era
Future of WorkTech
Companies are abandoning ‘peanut butter’ raises as pay-for-performance takes over the workplace in the AI era
By Marco Quiroz-GutierrezMay 9, 2026
1 day ago

Most Popular

'Employers are increasingly turning to degree and GPA' in hiring: Recruiters retreat from ‘talent is everywhere,’ double down on top colleges
Future of Work
'Employers are increasingly turning to degree and GPA' in hiring: Recruiters retreat from ‘talent is everywhere,’ double down on top colleges
By Jake AngeloMay 9, 2026
21 hours ago
Ted Cruz says the quiet part out loud: Trump accounts are Social Security personal accounts as GOP senator reveals 'dirty little secret'
Politics
Ted Cruz says the quiet part out loud: Trump accounts are Social Security personal accounts as GOP senator reveals 'dirty little secret'
By Jason MaMay 9, 2026
17 hours ago
Red flag test: former CEO explains why he rejects job candidates who say they can start right away
Success
Red flag test: former CEO explains why he rejects job candidates who say they can start right away
By Orianna Rosa RoyleMay 9, 2026
22 hours ago
You're probably safe from the Hantavirus outbreak, but here's what you absolutely must not do, experts say
Politics
You're probably safe from the Hantavirus outbreak, but here's what you absolutely must not do, experts say
By Catherina GioinoMay 8, 2026
2 days ago
Companies are abandoning 'peanut butter' raises as pay-for-performance takes over the workplace in the AI era
Future of Work
Companies are abandoning 'peanut butter' raises as pay-for-performance takes over the workplace in the AI era
By Marco Quiroz-GutierrezMay 9, 2026
1 day ago
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
Magazine
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
By Sharon GoldmanMay 6, 2026
4 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.