subscribe Support our award-winning journalism. The Premium package (digital only) is R30 for the first month and thereafter you pay R129 p/m now ad-free for all subscribers.
Subscribe now
Picture: 123RF
Picture: 123RF

Wellington — The New Zealand government said it had raised concerns on Tuesday with the Chinese government about its involvement in a state-sponsored cyber hack on New Zealand’s parliament in 2021, which was uncovered by the country’s intelligence services.

The revelations that information was accessed through malicious cyber activity targeting New Zealand’s parliamentarian entities come as Britain and the US accuse China of a large-scale cyber espionage campaign. New Zealand and Australia have condemned the broader activity.

“Foreign interference of this nature is unacceptable, and we have urged China to refrain from such activity in future,” New Zealand’s foreign minister, Winston Peters, said.

He said concerns about cyber activity attributed to groups sponsored by the Chinese government, targeting democratic institutions in New Zealand and the UK had been conveyed to the Chinese ambassador.

A top New Zealand intelligence official told a parliamentary committee on Tuesday that seven of its citizens had provided training to China’s military in the past 18 months, in what he said was a “major national security risk”.

A spokesperson for the Chinese embassy in New Zealand said in an email that they reject “outright such groundless and irresponsible accusations” and have expressed their dissatisfaction and resolute opposition with New Zealand authorities.

“We have never, nor will we in the future, interfere in the internal affairs of other countries, including New Zealand. Accusing China of foreign interference is completely barking up the wrong tree,” the spokesperson said.

The government said earlier on Tuesday its communications security bureau (GCSB), which overseas cybersecurity and signals intelligence, had established links between a Chinese state-sponsored actor known as Advanced Persistent Threat 40 (APT40) and malicious cyber activity targeting New Zealand’s parliamentary services and parliamentary counsel office in 2021.

Intrusive activity

The GCSB said APT40 is affiliated with the ministry of state security.

It added APT40 had gained access to important information that enables the effective operation of New Zealand government but nothing of a sensitive or strategic nature had been removed. Instead, the GCSB said it believed the group had removed information of a more technical nature that would have allowed more intrusive activity.

In the past financial year, 23% of the 316 malicious cyber events that involved nationally significant organisations were attributed to state-sponsored actors, according to the GCSB.

These attacks were not specifically attributed to China. New Zealand last year also condemned malicious cyber activity undertaken by the Russian government.

“The use of cyber-enabled espionage operations to interfere with democratic institutions and processes anywhere is unacceptable,” said Judith Collins, the minister responsible for the GCSB.

US and British officials late on Monday filed charges, imposed sanctions, and accused Beijing of a sweeping cyber espionage campaign that allegedly hit millions of people including legislators, academics and journalists, and companies including defence contractors.

American and British officials nicknamed the hacking group responsible Advanced Persistent Threat 31 or “APT31”, calling it an arm of China’s ministry of state security. Officials reeled off a laundry list of targets: White House staffers, US senators, British parliamentarians, and government officials worldwide who criticised Beijing. Defence contractors, dissidents and security companies were also hit, officials from the two countries said.

A joint statement from Australia’s foreign minister, Penny Wong, and home affairs minister Clare O'Neil said persistent targeting of democratic institutions and processes had implications for democratic and open societies such as Australia. It said this behaviour was unacceptable and must stop.

In 2019, Australian intelligence determined China was responsible for a cyberattack on its national parliament and three largest political parties before the general election but the Australian government never disclosed officially who was behind the attacks.

Andrew Hampton, director-general of security at New Zealand’s Security Intelligence Service, told a parliamentary committee on Tuesday that seven citizens had left their roles at companies providing training to China’s military.

“The training and expertise they were passing on was gained through previous employment with partner militaries and the New Zealand Defence Force,” he said.

“Such activity clearly poses a major national security risk.”


subscribe Support our award-winning journalism. The Premium package (digital only) is R30 for the first month and thereafter you pay R129 p/m now ad-free for all subscribers.
Subscribe now

Would you like to comment on this article?
Sign up (it's quick and free) or sign in now.

Speech Bubbles

Please read our Comment Policy before commenting.