Attacks On The US From China Increasing

The US has been a significant wave of attacks delivered by Chinese threat groups though to have links to China’s intelligence agencies, and these attacks have also penetrated the networks of several  leading US broadband service providers. 

The notorious Chinese hacking group named Volt Typhoon - previously known for attacks on US electricity networks - has infiltrated US Internet providers, gaining access to systems essential to the US national security. 

China’s cyber operations have grown into sophisticated campaigns targeting critical infrastructure, prompting the US to introduce specific legislation earlier this year to combat the threat. Now, leaders of the top US telecommunications companies  have been summoned to the White House to discuss how to expel Chinese hackers from the nation’s communications networks.

The US Cyber Defence Agency, CISA, the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) have all confirmed that Volt Typhoon have compromised the IT networks of multiple critical infrastructure organisations. 

This breach is not an isolated event, but part of a broader strategy to disrupt and weaken US' operational capabilities in the event of conflict. 

The FBI has also documented numerous cases of Chinese state-sponsored hackers infiltrating US telecommunications networks, gaining access to sensitive data that could be exploited in future conflicts or economic warfare.

The economic impact of China’s cyber-attacks is equally alarming. Intellectual property theft by Chinese state actors has extracted hundreds of billions of dollars from the US economy.

Chines originate cyber attacks have also been identified in sectors as diverse as  Artificial Intelligence and Biotechnology.China’s activities also extend into military and defence sectors. In one of the most brazen examples, Chinese hackers infiltrated contractor networks supporting the US Navy, stealing sensitive information about submarine technology, missile systems, and radar technology. These intrusions illustrate how Chinese cyber operations are not limited to economic sabotage but are directly aimed at weakening America’s defences.

The consequences of these attacks go beyond immediate breaches. By exploiting stolen US  innovations, Chinese firms gain an unfair competitive edge, undermining US companies’ ability to innovate and grow. Furthermore, there is a secondary effect in the erosion of public trust in critical systems. If the financial or the energy infrastructure were compromised, the cascading effects on economic stability are hazardous, to say the least.

Other effects, such as the manipulation of stolen data, could be used to influence elections or sow discord within the US, posing a direct threat to the nation’s democratic institutions.

The current cyber attacks are a wake-up call for US network security and should prompt a rethink in network design and  regulatory responsibility for the Federal agencies responsible oversight of US critical infrastructure.

CISA   |   Brookings Inst.   |   Guardian   |   Oodaloop   |    NYTimes   |   Indsutrial Cyber

Image: Kagenmi

You Might Also Read: 

Time For Cyber Force:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Is Zero Trust The Future Of Cybersecurity?
Four Evolving Trends Every Business Leader Should Be Aware Of »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

Surrey Centre for Cyber Security (SCCS)

Surrey Centre for Cyber Security (SCCS)

The Centre focuses on three main research directions - Privacy and Data Protection, Secure Communications, and Human-Centred Security.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

ExpressVPN

ExpressVPN

ExpressVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

ENAC

ENAC

ENAC is the national accreditation body for Spain. The directory of members provides details of organisations offering certification services for ISO 27001.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

Airtel Secure

Airtel Secure

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

InfoSec Brigade

InfoSec Brigade

InfoSec Brigade offers a suite of specialized solutions that help businesses to mitigate risk by integrating cyber and IT security protocols with business goals.

Kubus Hitam

Kubus Hitam

Kubus Hitam are a research-based company focused on cyber security. we strongly believe that innovation and safety are the two keywords for the future business market.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

Finlaw Associates

Finlaw Associates

Finlaw Associates is a trusted cybercrime law firm providing a wide range of taxation, legal, advisory and regulatory services to the financial, commercial and industrial communities.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.

Seiber

Seiber

Seiber are a UK based Cyber Security company who provide consultancy and training services. Our objective is to stop bad things happening to good people.