Attacks On The US From China Increasing

The US has been a significant wave of attacks delivered by Chinese threat groups though to have links to China’s intelligence agencies, and these attacks have also penetrated the networks of several  leading US broadband service providers. 

The notorious Chinese hacking group named Volt Typhoon - previously known for attacks on US electricity networks - has infiltrated US Internet providers, gaining access to systems essential to the US national security. 

China’s cyber operations have grown into sophisticated campaigns targeting critical infrastructure, prompting the US to introduce specific legislation earlier this year to combat the threat. Now, leaders of the top US telecommunications companies  have been summoned to the White House to discuss how to expel Chinese hackers from the nation’s communications networks.

The US Cyber Defence Agency, CISA, the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) have all confirmed that Volt Typhoon have compromised the IT networks of multiple critical infrastructure organisations. 

This breach is not an isolated event, but part of a broader strategy to disrupt and weaken US' operational capabilities in the event of conflict. 

The FBI has also documented numerous cases of Chinese state-sponsored hackers infiltrating US telecommunications networks, gaining access to sensitive data that could be exploited in future conflicts or economic warfare.

The economic impact of China’s cyber-attacks is equally alarming. Intellectual property theft by Chinese state actors has extracted hundreds of billions of dollars from the US economy.

Chines originate cyber attacks have also been identified in sectors as diverse as  Artificial Intelligence and Biotechnology.China’s activities also extend into military and defence sectors. In one of the most brazen examples, Chinese hackers infiltrated contractor networks supporting the US Navy, stealing sensitive information about submarine technology, missile systems, and radar technology. These intrusions illustrate how Chinese cyber operations are not limited to economic sabotage but are directly aimed at weakening America’s defences.

The consequences of these attacks go beyond immediate breaches. By exploiting stolen US  innovations, Chinese firms gain an unfair competitive edge, undermining US companies’ ability to innovate and grow. Furthermore, there is a secondary effect in the erosion of public trust in critical systems. If the financial or the energy infrastructure were compromised, the cascading effects on economic stability are hazardous, to say the least.

Other effects, such as the manipulation of stolen data, could be used to influence elections or sow discord within the US, posing a direct threat to the nation’s democratic institutions.

The current cyber attacks are a wake-up call for US network security and should prompt a rethink in network design and  regulatory responsibility for the Federal agencies responsible oversight of US critical infrastructure.

CISA   |   Brookings Inst.   |   Guardian   |   Oodaloop   |    NYTimes   |   Indsutrial Cyber

Image: Kagenmi

You Might Also Read: 

Time For Cyber Force:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Is Zero Trust The Future Of Cybersecurity?
Four Evolving Trends Every Business Leader Should Be Aware Of »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Code42

Code42

Code42 CrashPlan, is an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform.

Assuria

Assuria

Assuria Cyber Security solutions provide protective monitoring of systems and user activity across the whole IT infrastructure.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

Romanian Association for Electronic Industry & Software (ARIES)

Romanian Association for Electronic Industry & Software (ARIES)

ARIES is the Romanian Association for Electronic Industry and Software, the biggest and most influental organization created for the IT&C industry in Romania.

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

Oregon Systems

Oregon Systems

Oregon Systems is a Regional Leader & Distributor with value added services for OT, IoT, IIoT & IT Cybersecurity products, Solutions & professional services throughout the middle-east region.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.

Prequel

Prequel

Prequel is your real-time problem detection and resolution platform, powered by the global reliability community.