2 min read
Suspected Chinese hackers breach foreign ministries via Microsoft Servers
Farah Amod
Oct 23, 2025 3:14:38 AM

A state-aligned group known as Phantom Taurus reportedly targeted foreign ministries’ email servers to gather diplomatic intelligence.
What happened
Suspected Chinese hackers accessed Microsoft Exchange email servers belonging to foreign ministries, according to threat intelligence experts. The group behind the breach, tracked as Phantom Taurus, reportedly conducted a multi-year espionage campaign focused on the private communications of diplomats and embassy staff.
Researchers confirmed the attackers had full access to the internal email systems of certain ministries, where they searched for content tied to the 2022 China-Arab summit in Riyadh. Specific searches included the names of Chinese President Xi Jinping and First Lady Peng Liyuan. While the affected countries have not been publicly named, the activity was described as aligning closely with China’s geopolitical and economic interests.
Going deeper
The Phantom Taurus group has been under observation for nearly three years. The campaign goes beyond passive monitoring, indicating an intent to influence or prepare for diplomatic and military-related developments. Email content was exfiltrated from both embassies and military communication channels.
These recent findings are part of a broader pattern of suspected Chinese cyber activity. Earlier in September, attackers linked to China were accused of impersonating the Republican chair of the House Select Committee on China to access trade negotiation data. Google also confirmed a compromise of US tech firms by a Chinese group during the same month.
The Chinese Embassy in Washington denied responsibility, with spokesperson Liu Pengyu stating that cyberattacks are difficult to trace and that China opposes all forms of hacking.
The big picture
According to CNBC, Chinese intelligence hackers previously breached Microsoft email accounts “belonging to two dozen government agencies, including the State Department, in the U.S. and Western Europe,” in what officials described as a “significant” cyber-espionage campaign. Microsoft identified the group as Storm-0558, which had accessed systems “since at least May 2023.” The attack indicates China’s expanding cyber capabilities and echoed similar tactics seen in the Phantom Taurus operation, showing how Beijing-linked threat actors continue to target diplomatic and government networks for intelligence gathering.
FAQs
What is Phantom Taurus?
Phantom Taurus is the name given to a suspected Chinese state-aligned hacking group engaged in cyber espionage against foreign ministries, embassies, and military targets.
Why are Microsoft Exchange servers frequently targeted in espionage campaigns?
Microsoft Exchange servers often store large volumes of sensitive emails and metadata. They are attractive to attackers because access can yield real-time insights into diplomatic and operational communications.
How do researchers attribute cyberattacks to specific nations or actors?
Attribution is based on a combination of tactics, techniques, and procedures (TTPs), infrastructure reuse, code similarities, and observed targeting patterns that align with known threat groups.
What diplomatic implications can arise from espionage of this nature?
Such breaches can strain international relations, especially if evidence of surveillance or data tampering surfaces. It may also lead to retaliation through sanctions, public condemnation, or counterintelligence actions.
What steps can governments take to protect their email infrastructure?
Regular patching, multi-factor authentication, endpoint detection, and segmented networks are core defenses. Governments are also investing in zero-trust architectures and threat intelligence partnerships to identify state-level intrusions earlier.