Canada alerts the world against Chinese hacking tactics

Περισσότερα Νέα

- Advertisement -

Cybersecurity experts stress the need for the public and relevant organisations to treat this warning seriously, given that state-sponsored cyber programs conducted by China, Russia, Iran, and North Korea present the most substantial strategic cyber threats to Canada. These threats are particularly directed at critical infrastructure systems … writes Kaliph Anaz.

The recent public advisory issued by the Canadian Centre for Cyber Security, in conjunction with the Five Eyes intelligence alliance, has brought attention to a significant cyber threat originating from a state-sponsored actor affiliated with the People’s Republic of China. The issuance of such a public warning indicates the gravity of the situation and underscores the urgency for increased vigilance within Canada’s cybersecurity landscape.

Cybersecurity experts stress the need for the public and relevant organisations to treat this warning seriously, given that state-sponsored cyber programs conducted by China, Russia, Iran, and North Korea present the most substantial strategic cyber threats to Canada. These threats are particularly directed at critical infrastructure systems.

The interconnectedness of Western economies means that an attack on one country’s infrastructure can have severe repercussions for others. While the Canadian Cyber Centre has not received reports of the specific state actor targeting Canada, the interconnected nature of digital infrastructure implies that an attack on one nation could potentially impact the infrastructure of another. Thus, the advisory serves as a proactive measure to ensure that Canada remains prepared and vigilant against potential cyber threats

The identification of the state-sponsored actor responsible for the cyber threat originates from tech giant Microsoft. The actor, known as Volt Typhoon, is associated with the Chinese government and focuses primarily on espionage and information gathering. Microsoft’s decision to publicly attribute the threat to China is significant, as companies typically refrain from explicitly naming responsible parties. Such attribution by a prominent entity like Microsoft carries weight and necessitates a serious response.

- Advertisement -

Volt Typhoon’s operations are characterized by a technique referred to as “living off the land,” which involves exploiting existing network tools and valid credentials to evade detection. This approach differs from traditional malware attacks that generate new files on targeted systems. By utilizing preexisting tools and operating within a computer’s memory, Volt Typhoon enhances its ability to remain undetected and increases the challenges for cybersecurity defenders.

In a recent blog post, Microsoft revealed that the Volt Typhoon campaign aims to develop capabilities that could disrupt critical communications infrastructure between the United States and the Asian region during future crises. Since mid-2021, the group has targeted critical infrastructure organizations in Guam, home to a significant U.S. naval base, as well as various locations throughout the United States. The potential disruption of critical communications infrastructure poses significant risks to both national security and the functionality of essential services.

The revelation of this cyber threat prompts questions regarding potential counter-hacking measures, commonly referred to as “active measures.” Cybersecurity expert Thomas Patrick Keenan has raised inquiries regarding whether the Canadian military has authorized any such actions. While no explicit confirmation has been provided, Keenan was directed to the Canadian Armed Forces’ “Strong, Secure, Engaged” document, which outlines the country’s defence policy. The document indicates that the Canadian Armed Forces (CAF) has plans to develop active cyber capabilities and employ them against potential adversaries with government authorisation.

Canada needs 30,000 new immigrants in Agri sector: Report

However, engaging in active measures against the Chinese regime would likely escalate the situation and potentially lead to a cyberwar. Keenan notes that high[1]level authorization would be necessary for the Canadian military to become involved in such activities. It is important to consider the potential consequences and carefully deliberate any decisions related to counter-hacking measures to prevent a further escalation of the conflict. Still, tough actions need to be taken.

China cannot be given a leeway. This seems to underscore China’s salami slicing strategy. They keep provoking other nations, but just not enough to cause a war. And soon, the change the status quo into the new normal.

In conclusion, the public advisory issued by the Canadian Centre for Cyber Security in collaboration with the Five Eyes intelligence alliance highlights the severity of the cyber threat emanating from a state-sponsored actor associated with China. The advisory serves as a call to action for increased vigilance and cybersecurity preparedness within Canada. The identification of Volt Typhoon as the responsible actor underscores the significance of the threat, as attribution by a prominent entity like Microsoft carries substantial weight. The “living off the land” technique employed by Volt Typhoon presents challenges for detection and defence. The potential disruption of critical communications infrastructure further emphasizes the urgency for robust cybersecurity measures. Overall, the recent public advisory serves as a wake-up call for Canada and highlights the pressing need for enhanced cybersecurity measures.

It emphasizes the seriousness of state-sponsored cyber threats originating from China and the potential risks they pose to critical infrastructure, national security, and international relations. This advisory underscores the importance of international collaboration, threat intelligence sharing, and proactive defence strategies to mitigate the evolving cyber landscape.

As the digital realm becomes increasingly interconnected, it is crucial for governments, organizations, and individuals to remain vigilant, adapt to emerging threats, and prioritize cybersecurity as a fundamental aspect of national defence.

- Advertisement -

ΑΠΑΝΤΗΣΤΕ

εισάγετε το σχόλιό σας!
παρακαλώ εισάγετε το όνομά σας εδώ

The reCAPTCHA verification period has expired. Please reload the page.

Ροή ειδήσεων

ΣΧΕΤΙΚΑ ΑΡΘΡΑ

Why Pahalgam’s anniversary raises questions on Pakistan’s mediation

On anniversaries, narratives harden. They simplify. They seek moral clarity. But geopolitics rarely offers that luxury. As the first anniversary of the Pahalgam attack...

Economic Activity Limping Back to Normalcy in Pahalgam

Pahalgam is well-positioned not only to regain its pre-2025 vibrancy but also to build a more resilient and dynamic economy. The ongoing recovery is...

Pakistan the broker nobody should trust

As the anniversary of the Pahalgam attack approaches where Pakistan supported terrorists killed 26 tourists only on the basis of religion in India’s Kashmir...

Why Hopes That China Can Push Iran Toward Peace May Be Misplaced

When China's special envoy to the Middle East recently gave a colorful account of a dangerous overland journey through a war zone, it was...

ΔΗΜΟΦΙΛΗ ΑΡΘΡΑ

Αποκάλυψη: Ο πραγματικός σκιώδης ηγέτης του Ιράν: Το καθεστώς του Αγιατολάχ δεν υπάρχει – «Ο μεγάλος ηγεμόνας έπεσε»

Μετά τον τελευταίο πόλεμο στον οποίο το ιρανικό καθεστώς υπέστη σοβαρά πλήγματα από τις ΗΠΑ και το Ισραήλ και έχασε μάλιστα ένα μεγάλο μέρος...

Σημαντική εξέλιξη: Νέας αμυντική συμφωνία Κύπρου – Γαλλίας – Παρουσία γαλλικών δυνάμεων σε κυπριακό έδαφος

Ο Ν. Χριστοδουλίδης, ανέφερε ότι η συμφωνία θα υπογραφεί σε υπουργικό επίπεδο και εντάσσεται στο πλαίσιο της ενισχυμένης συνεργασίας με τη γαλλική κυβέρνηση. Παρουσία για...

Αποκάλυψη: Η Ελληνική Πολεμική Αεροπορία προκρίνει το C-390 Millennium ως το επόμενο μεταφορικό 

Η συζήτηση για το μέλλον των τακτικών αερομεταφορών της Πολεμικής Αεροπορίας δεν αποτελεί απλώς μια ακόμη εξοπλιστική επιλογή. Αντιθέτως, συνιστά μια απόφαση στρατηγικού χαρακτήρα που επηρεάζει...