Saturday 21 March, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

China alleges the US exploited Microsoft Exchange zero-day to target defence sector

Beijing accuses US intelligence of carrying out a year-long espionage campaign to steal sensitive military designs — a rare reversal in the nations’ long-running cyber blame game

Resilience MediabyResilience Media
August 11, 2025
in News
Photo by Yiran Ding on Unsplash

Photo by Yiran Ding on Unsplash

Share on Linkedin

China has formally accused US intelligence agencies of exploiting a previously unknown Microsoft Exchange zero‑day vulnerability to orchestrate a prolonged cyberattack against its defence sector.

You Might Also Like

The Perfect Swarm: How Swarmer got its timing just right – by accident – and saw its US IPO pop

Announcing the Resilience Conference Warsaw Agenda

HyImpulse eyes first European launch from SaxaVord as UK space ambitions gather pace

China’s National Internet Emergency Response Center (CNCERT), which describes itself as a non-governmental cybersecurity technical center, alleges that US intelligence hackers leveraged the flaw in Microsoft’s Exchange software to breach and maintain control of the email server of a major Chinese military-related enterprise (which it did not name) between July 2022 and July 2023.

During this alleged cyber‑espionage campaign, CNCERT claims the perpetrators stole sensitive defence data and maintained persistent access throughout that period.

“The attacker … launched more than 40 network attacks, stealing the emails of 11 people, including the senior management of the enterprise, involving the relevant design schemes, system core parameters and other contents of our military industry products,” reads a version of CNCERT’s statement translated by Resilience Media.

CNCERT claimed that, in a separate instance, US agents exploited vulnerabilities in an electronic file system, unrelated to Microsoft Exchange, to conduct cyberattacks against another Chinese military enterprise operating in the communications and satellite internet sector between July and November 2024, also exfiltrating confidential information.

“The attacker used the enterprise’s system software upgrade service to deliver theft Trojan horses to the enterprise’s intranet, invaded and controlled more than 300 devices, and searched for keywords such as ‘military special network’ and ‘core network’ to steal sensitive data on the accused host,” reads CNCERT’s alert.

Guo Jiakun, spokesperson of the Ministry of Foreign Affairs of China, said in a statement that the “US used its allies in Europe and in China’s neighboring region … to launch the cyberattacks.” He added that CNCERT’s alleged findings are “the latest evidence of the US government’s malicious cyberattacks on China” and “once again shows that the US is the top cyber threat faced by China.”

In a 1 August alert, CNCERT added that these alleged attacks, which it claims have been aggressively carried out since the US National Security Agency (NSA)’s alleged cyberattack on China’s Northwestern Polytechnical University in 2022, pose “a serious threat to the scientific research and production security of China’s defense and defense industries, and even to national security.”

Neither Microsoft nor the NSA immediately responded to Resilience Media’s questions.

These accusations follow a broader pattern of mutual cyberespionage allegations between Beijing and Washington. China’s latest claims echo earlier US assertions that Chinese state‑sponsored hackers have targeted its systems.

Notably, in 2021, Microsoft revealed that China-linked threat group Hafnium, also known as Silk Typhoon, had exploited multiple zero‑day vulnerabilities in Exchange to launch widespread intrusions across the globe. Those attacks affected tens of thousands of servers, including those belonging to US defense contractors, law firms, universities, NGOs, and healthcare research institutions. In response, Microsoft and international authorities issued patches and warnings to mitigate the damage.

Just last month, Microsoft said China-backed hacking groups had also exploited flaws in SharePoint to target governments and businesses that use the file-sharing software.

The UK’s National Cyber Security Centre told the BBC that these attacks, which focused on stealing intellectual property from organisations related to defense and strategic planning, targeted “a limited number” of SharePoint Server customers in the UK.

CNCERT’s latest allegations represent a rare reversal of narrative: China is now asserting that the US deployed analogous tactics against Chinese military‑industrial targets, underscoring intensifying tensions in cyberspace between the world’s two largest economies.

China’s accusations come just weeks after Ukraine’s national cyber authority warned that Russian state-backed hackers had been using AI-powered malware in active attacks targeting the country’s defence and security sector.

Tags: ChinaCNCERTGuo JiakunMicrosoft
Previous Post

BAE backs Oxford Dynamics to bolster UK defence autonomy with AI

Next Post

BAE Invests in a Startup; US Accused of Chinese Cyberattack; Darkstar Bootcamp returns to Kyiv (quiet week)

Resilience Media

Resilience Media

Start Ups. Security. Defense.

Related News

a large flock of birds flying over a field

The Perfect Swarm: How Swarmer got its timing just right – by accident – and saw its US IPO pop

byIngrid Lunden
March 20, 2026

Timing accounts for a lot in business. Such was the case for Swarmer, a startup out of Ukraine that develops...

Announcing the Resilience Conference Warsaw Agenda

byLeslie Hitchcockand1 others
March 19, 2026

We are excited to announce the agenda for Resilience Conference Warsaw, 15 April 2026. This is the first conference of...

HyImpulse eyes first European launch from SaxaVord as UK space ambitions gather pace

HyImpulse eyes first European launch from SaxaVord as UK space ambitions gather pace

byCarly Page
March 19, 2026

German aerospace startup HyImpulse has signed a launch agreement with SaxaVord Spaceport in Scotland to carry out the next flight...

a view of a city from the top of a building

The UK is setting up meetings between Gulf states and defence tech startups

byIngrid Lunden
March 18, 2026

The last few weeks have seen the UK stepping up its direct military engagement in the Middle East to defend...

Sille Pettai steps down from CEO role at SmartCap

Sille Pettai steps down from CEO role at SmartCap

byFiona Alston
March 17, 2026

Big news in European defence tech investment. Sille Pettai, the CEO of SmartCap -- the Estonian state-owned investment fund --...

100 Startups to Watch in 2026

100 Startups to Watch in 2026

byLeslie Hitchcockand1 others
March 17, 2026

Defence has long been the domain of primes. The war in Ukraine has changed that by introducing the tech sector...

person on top of brown steel frame

How Ukraine is transforming its battlefield data into a world-first AI training hub

byThomas Macauley
March 16, 2026

After four years effectively as an all-in-one laboratory, training ground and live arena for technology to fight its own war,...

US and UK ballistic missile defence capabilities brought into focus as Iran lashes out against region

US and UK ballistic missile defence capabilities brought into focus as Iran lashes out against region

byTom Pashby
March 12, 2026

The ballistic missile defence capabilities of the US, UK and other allies have been put to the test as the...

Load More
Next Post
BAE Invests in a Startup; US Accused of Chinese Cyberattack; Darkstar Bootcamp returns to Kyiv (quiet week)

BAE Invests in a Startup; US Accused of Chinese Cyberattack; Darkstar Bootcamp returns to Kyiv (quiet week)

Milrem and Frontline partner to power up Milrem’s THeMIS vehicles with BURIA grenade systems

Milrem and Frontline partner to power up Milrem’s THeMIS vehicles with BURIA grenade systems

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Senai exits stealth to help governments harness online video intelligence

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.