Trade Law Daily is a Warren News publication.

Chinese Gov't Actors Hacked NFTC, According to Cybersecurity Firm

Chinese “nation-state threat actors” breached the National Foreign Trade Council’s (NFTC’s) website at least between Feb. 27 and March 1, through using a link leading to a remote script that would launch when anyone visited certain pages on the website,…

Sign up for a free preview to unlock the rest of this article

Timely, relevant coverage of court proceedings and agency rulings involving tariffs, classification, valuation, origin and antidumping and countervailing duties. Each day, Trade Law Daily subscribers receive a daily headline email, in-depth PDF edition and access to all relevant documents via our trade law source document library and website.

Fidelis Cybersecurity said in a summary after observing the incident (here). Fidelis first observed the “inject” on the registration page for an NFTC board of directors meeting in Washington scheduled for March 7, the cyber firm said. The remote script was the “Scanbox framework,” a Web reconnaissance tool exclusively known in the research community to have been used by bad actors working with or sponsored by the Chinese government, Fidelis said. It is “highly probable” that the hack targeted private sector players involved in lobbying on U.S. foreign trade policy, the company said. NFTC didn’t comment.