Feature

How did China hack the UK Ministry of Defence?

China denies hacking UK armed forces' SSCL payroll data services, which are operated by French tech giant Sopra Steria, writes Alex Blair.

The UK MoD ministerial office in Whitehall, London. Credit: William Barton / Shutterstock

China stands accused of hacking the UK Ministry of Defence (MoD) in a major cyberattack on armed forces’ SSCL payroll data system. The data breach compromised the names and bank details of current military personnel and veterans, Sky News reported.  

When addressing the House of Commons on 7 May, UK Defence Secretary Grant Shapps said a “malign actor” was responsible for the attack, but that the government “cannot rule out state involvement”. He added that there was “no evidence that any data has been removed”.  

Shapps has announced a "multi-point plan to support and protect personnel", an MoD spokesperson told Army Technology. 

The MoD has been working urgently to grasp the scale of the cyberattack over the last three days since discovering the data breach. 

The UK government has yet to name a suspected culprit. Former head of the National Cyber Security Centre (NCSC) Ciaran Martin said “there’s nothing unusual or untoward about the government not saying who they think is behind the breach at this stage” in a thread on X.  

“If past form is a guide, bring allies on board before formally accusing another state (or criminal group)”, Martin added, a referring to former US Director of National Intelligence James Clapper’s allegations towards China over the 2015 OPM breach. “Accuracy and allies are more important than speed”.  

Who is responsible for the MoD’s payroll contract?

UK Prime Minister Rishi Sunak, meanwhile, refused to blame China directly, but more broadly said he “set out a very robust policy towards China to protect ourselves against the risks that China, and other countries, pose to us”.  

Sunak’s spokesperson added that “in relation to the specific contractor involved in the incident, a security review of that contractor’s operations is under way and appropriate steps will be taken after that”.  

SSCL, a joint venture between the UK Cabinet Office and French tech company Sopra Steria, holds the overarching payroll contract for MoD payroll data. SSCL is responsible for “delivering the MoD’s vision to transform core payroll, HR and pension services for 230,000 military personnel and reservists and 2 million veterans”, according to Sopra Steria’s website

Labour's Shadow Defence Secretary John Healey claimed that SSCL is the culpable contractor.  

It remains unclear if Sopra Steria directly operates the payroll element of the SSCL contract or if it is overseen by a downstream contract. Shapps, however, added that the breach was due to the “potential failings” of the contractor.  

Army Technology has approached Sopra Steria and SSCL regarding the reported attack and whether its systems were targeted. 

UK Defence Secretary Grant Shapps arriving at Downing Street earlier today (7 May). Credit: Wiktor Szymanowicz / Getty Images

While the attack seems to have followed the pattern of a typical supply chain breach, Sopra Steria has previously been targeted by the Ryuk ransomware variant. In 2020, a Russia-linked ransomware attack was estimated to cost the Paris-headquartered company between $48m and $60m.

What does Beijing stand to gain?

On 7 May, Chinese Foreign Ministry spokesperson Lin Jian described the allegations as “absurd”, stating that Beijing “opposes all forms of cyberattacks”. 

Potentially sensitive data on key MoD individuals is an invaluable asset for Beijing amid rising tensions between China and the US, the UK and other Western powers. 

The allegations of state-sponsored cyber espionage come as Chinese President Xi Jinping visits Europe for the first time in five years. Xi landed in France on 5 May and has committed to “refrain from selling any weapons” to Russia – at least according to French President Emmanuel Macron.

The latest cyberattack also aligns with China’s capability in human intelligence. Beijing’s Ministry of State Security has the widest reach of any global intelligence agency and has frequently used cyberattack strategies to sow doubt and gain leverage over rival states. 

This payroll data breach is the latest in a series of alleged Chinese state-sponsored cyberattacks on UK. 

In March, Deputy Prime Minister Oliver Dowden revealed two incidents, one involving a breach of the UK’s Electoral Commission and the other a series of targeted attacks on China-sceptic MPs. 

Attention remains fixated on the MoD’s response to China’s alleged act of cyber warfare on a military and government institution. 

Go to article: Home | Military SATCOM: is UK defence fit for purpose?Go to article: Editor's letterGo to article: ContentsGo to article: Bombardier Company InsightGo to article: Dassault Systèmes Company InsightGo to article: BriefingGo to article: News in NumbersGo to article: Latest NewsGo to article: Latest DealsGo to article: Project UpdatesGo to article: In DepthGo to article: Military SATCOM: is UK defence fit for purpose?Go to article: Critical fires: naval main guns maintain relevance Go to article: Australia’s multi-domain spending spreeGo to article: Analysis: Western artillery provision to Ukraine Go to article: Loitering munitions: from niche to necessityGo to article: Japan: reemergence of an Asia-Pacific powerGo to article: FLRAA: programme progress and global impactGo to article: British Army: Challenger 3 or Leopard 2A7s? Go to article: Diehl DefenceGo to article: Thematic TakeGo to article: Thematic Take: contentsGo to article: Foreword: Cybersecurity in the age of AI Go to article: Navigating the AI-driven cybersecurity landscapeGo to article: Key trends impacting cybersecurity Go to article: Timeline: a history of cybersecurity Go to article: Explainer: The most common types of cyberattacks Go to article: The impact of cybersecurity on defence Go to article: Case studies: cybersecurity in defence Go to article: Leading cybersecurity adopters and providers in defence Go to article: Latest news: Ukraine war dominant in cyber operationsGo to article: AI attacks now ‘the main cybersecurity concern’ for businesses across sectors Go to article: The state of cybersecurity: AI and geopolitics mean a bigger threat than ever Go to article: Companies’ own AI applications are ‘a huge cybersecurity problem’ Go to article: Sweden’s Nato accession: a cyberattack-filled saga Go to article: Germany recalls ambassador to Russia over cyberattacks Go to article: Why have cyberattacks in Poland spiked since Donald Tusk’s election? Go to article: How did China hack the UK Ministry of Defence? Go to article: Will IoT in defence continue to grow amid cybersecurity concerns? Go to article: AI Innovations wants to use semi-autonomous drones to save lives in Ukraine Go to article: Deal activity related to cybersecurity in the aerospace & defence industry since 2021  Go to article: Regulators must protect the cybersecurity market from a private equity takeover Go to article: GlobalData Thematic IntelligenceGo to article: Sponsored supplementsGo to article: ListingsGo to article: EventsGo to article: Event: Land ForcesGo to article: Excellence AwardsGo to article: Innovation RankingsGo to article: Buyer's GuidesGo to article: Frankfurt LaserGo to article: Next issue