Attacks On The US From China Increasing

The US has been a significant wave of attacks delivered by Chinese threat groups though to have links to China’s intelligence agencies, and these attacks have also penetrated the networks of several  leading US broadband service providers. 

The notorious Chinese hacking group named Volt Typhoon - previously known for attacks on US electricity networks - has infiltrated US Internet providers, gaining access to systems essential to the US national security. 

China’s cyber operations have grown into sophisticated campaigns targeting critical infrastructure, prompting the US to introduce specific legislation earlier this year to combat the threat. Now, leaders of the top US telecommunications companies  have been summoned to the White House to discuss how to expel Chinese hackers from the nation’s communications networks.

The US Cyber Defence Agency, CISA, the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) have all confirmed that Volt Typhoon have compromised the IT networks of multiple critical infrastructure organisations. 

This breach is not an isolated event, but part of a broader strategy to disrupt and weaken US' operational capabilities in the event of conflict. 

The FBI has also documented numerous cases of Chinese state-sponsored hackers infiltrating US telecommunications networks, gaining access to sensitive data that could be exploited in future conflicts or economic warfare.

The economic impact of China’s cyber-attacks is equally alarming. Intellectual property theft by Chinese state actors has extracted hundreds of billions of dollars from the US economy.

Chines originate cyber attacks have also been identified in sectors as diverse as  Artificial Intelligence and Biotechnology.China’s activities also extend into military and defence sectors. In one of the most brazen examples, Chinese hackers infiltrated contractor networks supporting the US Navy, stealing sensitive information about submarine technology, missile systems, and radar technology. These intrusions illustrate how Chinese cyber operations are not limited to economic sabotage but are directly aimed at weakening America’s defences.

The consequences of these attacks go beyond immediate breaches. By exploiting stolen US  innovations, Chinese firms gain an unfair competitive edge, undermining US companies’ ability to innovate and grow. Furthermore, there is a secondary effect in the erosion of public trust in critical systems. If the financial or the energy infrastructure were compromised, the cascading effects on economic stability are hazardous, to say the least.

Other effects, such as the manipulation of stolen data, could be used to influence elections or sow discord within the US, posing a direct threat to the nation’s democratic institutions.

The current cyber attacks are a wake-up call for US network security and should prompt a rethink in network design and  regulatory responsibility for the Federal agencies responsible oversight of US critical infrastructure.

CISA   |   Brookings Inst.   |   Guardian   |   Oodaloop   |    NYTimes   |   Indsutrial Cyber

Image: Kagenmi

You Might Also Read: 

Time For Cyber Force:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Is Zero Trust The Future Of Cybersecurity?
Four Evolving Trends Every Business Leader Should Be Aware Of »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

Microsoft Security

Microsoft Security

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind. Safeguard your people, data, and infrastructure.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

Aergo

Aergo

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.

Sherweb

Sherweb

Sherweb are a marketplace of leading cloud solutions and value-added services delivered by a team of passionate experts invested in MSP growth.

Securitribe

Securitribe

Securitribe provides cybersecurity and compliance solutions, including vCISO services, ISO27001, and ASD Essential 8 advisory, helping businesses and government strengthen security & compliance.

Cyber Solutions Inc

Cyber Solutions Inc

Cyber Solutions has been providing professional IT Support for businesses since 1998.