
The China-sponsored hack into New Zealand parliamentary systems is unlikely to have yielded any personal information of MPs or ministers, according to the Minister for the Government Communications Security Bureau (GCSB) at the time of the cyber attack.
Andrew Little was informed of the cyber attack in 2021, when he was the minister, but investigations were ongoing into who was behind it.
鈥淭he attack ended up being mainly on the Parliamentary Counsel Office (PCO) - they鈥檝e got draft legislation and instructions, that sort of thing,鈥 he told the Herald.
鈥淏ut in terms of, personal information about MPs and ministers, that sort of stuff, I think the risk in relation to that was assessed as very low.鈥
He agreed with comments today by GCSB director-general Andrew Clark that nothing sensitive or strategic was accessed.
GCSB minister Judith Collins revealed the hack this morning in a statement that also condemned China for its 鈥渕alicious cyber activity鈥 aimed at the UK鈥檚 Electoral Commission and members of its Parliament.
It follows reports of United States, British and Australian officials filing charges, imposing sanctions or calling out Beijing over a sweeping cyber-espionage campaign that allegedly hit millions of people, including lawmakers, academics and journalists.
The Chinese ambassador to New Zealand, Wang Xiaolong, has also been spoken to late this morning by senior foreign affairs officials, who urged him to convey to China New Zealand鈥檚 request to refrain from such activity in the future.
He later said on X: 鈥淲e reject outright the groundless and irresponsible accusations against China on cyber attacks or intrusions, and have lodged serious d茅marches to New Zealand鈥檚 relevant authorities, expressing strong dissatisfaction and resolute opposition.鈥
Little released a statement in 2021 condemning China for sponsoring malicious cyber activity in New Zealand and around the world, but with investigations still ongoing, it was not known at the time that the hack into parliamentary systems was China-backed.
- Watch live: PM faces Question Time amid Chinese spying claims, Budget lead-up
- Chinese hackers stole data, spies confirm; Govt says no sanctions
The same Chinese state-sponsored actor - known as APT 40 (Advanced Persistent Threat) - that hacked into the PCO and Parliamentary Service had earlier in 2021 exploited Microsoft Exchange vulnerabilities in New Zealand.
The impact of the Microsoft Exchange activity was also assessed as low, Little said, even though the use of such software is widespread.
鈥淎ny harm was pretty minimal. But the fact it had been discovered, and that attempts to exploit it by state actors had also been discovered, it was a big deal because the potential for vulnerability was significant.鈥
Andrew Little was GCSB Minister at the time of the China-sponsored hack into New Zealand parliamentary systems. Photo / Marty Melville
He said there were close to 400 cybersecurity breaches every year, with close to a quarter of them backed by state actors.
鈥淚 think we responded well when it becomes known, but I think the point that Andrew Clark was making today is that鈥檚 not the best protection. The best protection of the preventive measures, and that鈥檚 for every organisation, public and private, to make sure vulnerabilities aren鈥檛 exploited,鈥 Little said.
鈥淭hat鈥檚 as simple as making sure passwords are strong and secure, that software protections are actually implemented, and that basic maintenance is done on systems.
鈥淚n my time [as minister], some of the breaches that were brought to my attention related to just poor IT hygiene.鈥
It wasn鈥檛 necessarily a failure that APT 40 had accessed the PCO system in the first place, he said.
鈥淭here鈥檚 a reason why they鈥檙e called Advanced Persistent Threat. They are constantly trawling around systems for vulnerabilities, and they won鈥檛 be going after them once or twice. It鈥檒l be many times, all the time, trying to find vulnerability.鈥
Security expert Paul Buchanan, a former intelligence and defense policy analyst, told the Herald that it won鈥檛 be the last time China targets New Zealand parliamentary systems.
鈥淭hat is what they do as a matter of course because New Zealand is often seen as the Achilles heel of the Five Eyes network due to traditionally poor cyber security practices.鈥
But Little dismissed this characterisation.
鈥淚n my time as minister, I met with the heads of most of the agencies who are counterparts of ours in the Five Eyes Partnership. The overwhelming message I got was a message of appreciation for the contribution that we make, and the standards that we operate to.鈥
Little said he didn鈥檛 think China would hit New Zealand with trade sanctions.
鈥淚n the end, China understands that our relationship with them is multidimensional. I think that the prospects of retaliatory action are very low.鈥
GCSB Minister Judith Collins condemned the state-sponsored hack into New Zealand parliamentary systems in 2021. Photo / Mark Mitchell
鈥業ngenious, well-resourced and persistent鈥
Buchanan noted the response from other Five Eyes partners including the US, UK and Australia, which served as a warning that 鈥渢he times of easy access to critical data infrastructure, even if indirectly and even in New Zealand, are over.
鈥淭hat remains to be seen because, if nothing else, the PRC hacking community is ingenious, well-resourced and persistent.
鈥淭his is part of the PRC鈥檚 ascent to having a multi-dimensional, multi-domain (air, land, sea, space, cyber) warfare capability on its way to achieving superpower status. And as part of Five Eyes, NZ is standing in the (albeit small) way of that goal.鈥
Waikato University Law Professor Alex Gillespie said China had plausible deniability, given the cyberattack was done through an agent.
鈥淭o the minds of many, this is only a paper-wall and it would not be plausible to suggest they are separate,鈥 Gilliespie said.
鈥淭he breach itself is significant. Targeting the institutions that allow our democracy to flourish is not the action of a friend. It is not surprising. These breaches are becoming more common. What is surprising is the timing of it being called out, in unison, with like-minded friends.鈥
He said New Zealand could explore imposing travel sanctions as a more severe message to China.
鈥淭he challenge is that the Government does not want to get into any type of penalty against the Chinese government or its citizens. That could provoke any number of responses, none of which would be positive, hence the approach of just 鈥榮hining light鈥 on to the problem.鈥
This would be hoped to be a sufficient deterrent, he said, though whether that is the case is 鈥渁 question of debate鈥.
Little, also a former Immigration Minister, added that imposing travel sanctions would be difficult because immigration laws mean that individuals have to be known, and the grounds for banning their travel have to be justified.
Derek Cheng is a senior journalist who started at the Herald in 2004. He has worked several stints in the press gallery team and is a former deputy political editor.
Take your Radio, Podcasts and Music with you
Get the iHeart App
Get more of the radio, music and podcasts you love with the FREE iHeartRadio app. Scan the QR code to download now.
Download from the app stores
Stream unlimited music, thousands of radio stations and podcasts all in one app. iHeartRadio is easy to use and all FREE