The European Union on Thursday imposed its first-ever sanctions over cyberattacks, slapping them on alleged Russian military agents, Chinese cyber spies and organizations including a North Korean firm.
The six people and three groups hit with sanctions include Russia’s GRU military intelligence agency. EU headquarters blamed them in a statement for the 2017 “WannaCry” ransomware and “NotPetya” malware attacks and the “Cloud Hopper” cyberespionage campaign.
EU foreign policy chief Josep Borrell said the sanctions "are a travel ban and asset freeze to natural persons and an asset freeze to entities or bodies. It is also prohibited to directly or indirectly make funds available to listed individuals and entities or bodies."
Four Russians identified as GRU members were accused of trying to hack the Wi-Fi network of the Netherlands-based Organization for the Prohibition of Chemical Weapons, or OPCW, which has probed the use of chemical weapons in Syria. The 2018 attack was foiled by Dutch authorities.
The GRU was also sanctioned for NotPetya, which targeted companies that do business with Ukraine and caused billions of dollars in damage globally, and cyberattacks on Ukraine’s power grid in 2015 and 2016.
The two sanctioned Chinese nationals were accused of involvement in “Operation Cloud Hopper,” which the EU said hit companies on six continents, including Europe, through cloud services providers and “gained unauthorized access to commercially sensitive data, resulting in significant economic loss.”
One of the two, Zhang Shilong, was indicted in the United States in December 2018 for his alleged role in the operation, which U.S. authorities said at the time targeted a wide array of industries including aviation, biotechnology and satellite and maritime technology. Also sanctioned by the EU was the Chinese company Huaying Haitai, listed as Zhang’s employer.
U.S. & World
The North Korean firm sanctioned is Chosun Expo, which the EU said backed cyberattacks including WannaCry, the hacking of Sony Pictures and cyber robberies of Vietnamese and Bangladeshi banks.
A leading U.S. cybersecurity expert noted that the attempt to hack the chemical weapons group involved a rare physical visit to its organization’s facilities in The Hague, Netherlands.
Feeling out of the loop? We'll catch you up on the Chicago news you need to know. Sign up for the weekly Chicago Catch-Up newsletter.
"The consistent use of physical human intelligence teams to supplement its intrusion efforts makes the GRU a particularly effective adversary," said John Hultquist, director of threat intelligence at FireEye.
"Sanctions may be particularly effective for disrupting this activity as they may hinder the free movement of this unit," he said.
AP Technology Writer Frank Bajak in Boston contributed to this report.