Attacks On The US From China Increasing

The US has been a significant wave of attacks delivered by Chinese threat groups though to have links to China’s intelligence agencies, and these attacks have also penetrated the networks of several  leading US broadband service providers. 

The notorious Chinese hacking group named Volt Typhoon - previously known for attacks on US electricity networks - has infiltrated US Internet providers, gaining access to systems essential to the US national security. 

China’s cyber operations have grown into sophisticated campaigns targeting critical infrastructure, prompting the US to introduce specific legislation earlier this year to combat the threat. Now, leaders of the top US telecommunications companies  have been summoned to the White House to discuss how to expel Chinese hackers from the nation’s communications networks.

The US Cyber Defence Agency, CISA, the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) have all confirmed that Volt Typhoon have compromised the IT networks of multiple critical infrastructure organisations. 

This breach is not an isolated event, but part of a broader strategy to disrupt and weaken US' operational capabilities in the event of conflict. 

The FBI has also documented numerous cases of Chinese state-sponsored hackers infiltrating US telecommunications networks, gaining access to sensitive data that could be exploited in future conflicts or economic warfare.

The economic impact of China’s cyber-attacks is equally alarming. Intellectual property theft by Chinese state actors has extracted hundreds of billions of dollars from the US economy.

Chines originate cyber attacks have also been identified in sectors as diverse as  Artificial Intelligence and Biotechnology.China’s activities also extend into military and defence sectors. In one of the most brazen examples, Chinese hackers infiltrated contractor networks supporting the US Navy, stealing sensitive information about submarine technology, missile systems, and radar technology. These intrusions illustrate how Chinese cyber operations are not limited to economic sabotage but are directly aimed at weakening America’s defences.

The consequences of these attacks go beyond immediate breaches. By exploiting stolen US  innovations, Chinese firms gain an unfair competitive edge, undermining US companies’ ability to innovate and grow. Furthermore, there is a secondary effect in the erosion of public trust in critical systems. If the financial or the energy infrastructure were compromised, the cascading effects on economic stability are hazardous, to say the least.

Other effects, such as the manipulation of stolen data, could be used to influence elections or sow discord within the US, posing a direct threat to the nation’s democratic institutions.

The current cyber attacks are a wake-up call for US network security and should prompt a rethink in network design and  regulatory responsibility for the Federal agencies responsible oversight of US critical infrastructure.

CISA   |   Brookings Inst.   |   Guardian   |   Oodaloop   |    NYTimes   |   Indsutrial Cyber

Image: Kagenmi

You Might Also Read: 

Time For Cyber Force:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Is Zero Trust The Future Of Cybersecurity?
Four Evolving Trends Every Business Leader Should Be Aware Of »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

OpenZeppelin

OpenZeppelin

OpenZeppelin builds developer tools and performs security audits for distributed systems that power multimillion-dollar economies.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

CYTUR

CYTUR

CYTUR provide trusted and secured maritime cybersecurity solutions to keep ships safe, protecting them, their crews, cargo and all stakeholders from maritime cyber threats.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

Unified Infotech

Unified Infotech

Unified Infotech is a trusted partner for IT and software solutions dedicated to empowering businesses.