Skip to Content
Computing

A Norwegian cloud computing firm has been hit by a Chinese cyberattack

February 6, 2019

The attack on Visma, which has over 900,000 customers, is likely to be a precursor to other cyber assaults on cloud computing companies.

The news: According to Reuters, Chinese hackers were able to penetrate the systems of Visma, which provides online accounting, HR, and other software to customers across Scandinavia and other parts of Europe. The company detected the intrusion swiftly, and it says that none of its clients’ systems were affected. A Visma executive told Reuters the attack “could have been catastrophic” if it hadn’t been detected early.
 
The hack: Visma was one of several companies targeted in what investigators say is a major hacking operation focused on cloud companies. The attack, which ran between November 2017 and December 2018, was traced by cybersecurity firms to a group in China. China has repeatedly claimed that it does not engage in cyberattacks.
 
Tempting targets: As I said at the beginning of the year, companies offering cloud computing services are popular targets because if hackers can breach them, they can then sneak into customers’ systems too. (That’s why investigators have dubbed the Chinese cyberattack “Cloudhopper.”) While cloud giants like Amazon and Google can spend a fortune on cybersecurity—and Visma was able to foil the attack—smaller firms may be more vulnerable. 

Sign up here to our daily newsletter The Download to get your dose of the latest must-read news from the world of emerging tech.

Deep Dive

Computing

How ASML took over the chipmaking chessboard

MIT Technology Review sat down with outgoing CTO Martin van den Brink to talk about the company’s rise to dominance and the life and death of Moore’s Law.

 

How Wi-Fi sensing became usable tech

After a decade of obscurity, the technology is being used to track people’s movements.

Algorithms are everywhere

Three new books warn against turning into the person the algorithm thinks you are.

VR headsets can be hacked with an Inception-style attack

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.