Attacks On The US From China Increasing

The US has been a significant wave of attacks delivered by Chinese threat groups though to have links to China’s intelligence agencies, and these attacks have also penetrated the networks of several  leading US broadband service providers. 

The notorious Chinese hacking group named Volt Typhoon - previously known for attacks on US electricity networks - has infiltrated US Internet providers, gaining access to systems essential to the US national security. 

China’s cyber operations have grown into sophisticated campaigns targeting critical infrastructure, prompting the US to introduce specific legislation earlier this year to combat the threat. Now, leaders of the top US telecommunications companies  have been summoned to the White House to discuss how to expel Chinese hackers from the nation’s communications networks.

The US Cyber Defence Agency, CISA, the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) have all confirmed that Volt Typhoon have compromised the IT networks of multiple critical infrastructure organisations. 

This breach is not an isolated event, but part of a broader strategy to disrupt and weaken US' operational capabilities in the event of conflict. 

The FBI has also documented numerous cases of Chinese state-sponsored hackers infiltrating US telecommunications networks, gaining access to sensitive data that could be exploited in future conflicts or economic warfare.

The economic impact of China’s cyber-attacks is equally alarming. Intellectual property theft by Chinese state actors has extracted hundreds of billions of dollars from the US economy.

Chines originate cyber attacks have also been identified in sectors as diverse as  Artificial Intelligence and Biotechnology.China’s activities also extend into military and defence sectors. In one of the most brazen examples, Chinese hackers infiltrated contractor networks supporting the US Navy, stealing sensitive information about submarine technology, missile systems, and radar technology. These intrusions illustrate how Chinese cyber operations are not limited to economic sabotage but are directly aimed at weakening America’s defences.

The consequences of these attacks go beyond immediate breaches. By exploiting stolen US  innovations, Chinese firms gain an unfair competitive edge, undermining US companies’ ability to innovate and grow. Furthermore, there is a secondary effect in the erosion of public trust in critical systems. If the financial or the energy infrastructure were compromised, the cascading effects on economic stability are hazardous, to say the least.

Other effects, such as the manipulation of stolen data, could be used to influence elections or sow discord within the US, posing a direct threat to the nation’s democratic institutions.

The current cyber attacks are a wake-up call for US network security and should prompt a rethink in network design and  regulatory responsibility for the Federal agencies responsible oversight of US critical infrastructure.

CISA   |   Brookings Inst.   |   Guardian   |   Oodaloop   |    NYTimes   |   Indsutrial Cyber

Image: Kagenmi

You Might Also Read: 

Time For Cyber Force:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Is Zero Trust The Future Of Cybersecurity?
Four Evolving Trends Every Business Leader Should Be Aware Of »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

SecureNow Insurance Broker

SecureNow Insurance Broker

SecureNow is a commercial insurance broker based in India. Services offered include Cyber Risk insurance.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Financial Services Information Sharing and Analysis Center (FS-ISAC)

The Financial Services Information Sharing and Analysis Center is the only global cyber intelligence sharing community solely focused on financial services.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

Vivid Computing Solutions

Vivid Computing Solutions

At Vivid Computing Solutions we provide comprehensive solutions that keep your business running efficiently and securely.