14.7 C
Athens
Δευτέρα, 23 Δεκεμβρίου, 2024

China Hacks US Critical Networks in Guam, Raising Cyberwar Fears

wired.com

Περισσότερα Νέα

- Advertisement -

AS STATE-SPONSORED HACKERS working on behalf of Russia, Iran, and North Korea have for years wreaked havoc with disruptive cyberattacks across the globe, China’s military and intelligence hackers have largely maintained a reputation for constraining their intrusions to espionage. But when those cyberspies breach critical infrastructure in the United States—and specifically a US territory on China’s doorstep—spying, conflict contingency planning, and cyberwar escalation all start to look dangerously similar.

On Wednesday, Microsoft revealed in a blog post that it has tracked a group of what it believes to be Chinese state-sponsored hackers who have since 2021 carried out a broad hacking campaign that has targeted critical infrastructure systems in US states and Guam, including communications, manufacturing, utilities, construction, and transportation.

The intentions of the group, which Microsoft has named Volt Typhoon, may simply be espionage, given that it doesn’t appear to have used its access to those critical networks to carry out data destruction or other offensive attacks. But Microsoft warns that the nature of the group’s targeting, including in a Pacific territory that might play a key role in a military or diplomatic conflict with China, may yet enable that sort of disruption.

“Observed behavior suggests that the threat actor intends to perform espionage and maintain access without being detected for as long as possible,” the company’s blog post reads. But it couples that statement with an assessment with “moderate confidence” that the hackers are “pursuing development of capabilities that could disrupt critical communications infrastructure between the United States and Asia region during future crises.”

Google-owned cybersecurity firm Mandiant says it has also tracked a swath of the group’s intrusions and offers a similar warning about the group’s focus on critical infrastructure “There’s not a clear connection to intellectual property or policy information that we expect from an espionage operation,” says John Hultquist, who heads threat intelligence at Mandiant. “That leads us to question whether they’re there because the targets are critical. Our concern is that the focus on critical infrastructure is preparation for potential disruptive or destructive attack.”

- Advertisement -

This aligns with Microsoft’s conclusions. A spokesperson told WIRED in a statement that the company has moderate confidence about the group laying the groundwork to expand its operations beyond espionage because “the capability to disrupt is present,” but there is not enough evidence to indicate “clear intent to disrupt.”

The group’s “actions suggest this is not an exclusively espionage objective,” the spokesperson wrote in the statement. “Focused effort to maintain access to these types of targeted organizations suggests that the threat actor anticipates additional future operations against those systems.”

Microsoft’s blog post offered technical details of the hackers’ intrusions that may help network defenders spot and evict them: The group, for instance, uses hacked routers, firewalls, and other network “edge” devices as proxies to launch its hacking—targeting devices that include those sold by hardware makers ASUS, Cisco, D-Link, Netgear, and Zyxel. The group also often exploits the access provided from compromised accounts of legitimate users rather than its own malware to make its activity harder to detect by appearing to be benign.

Blending in with a target’s regular network traffic in an attempt to evade detection is a hallmark of Volt Typhoon and other Chinese actors’ approach in recent years, says Marc Burnard, a senior consultant of information security research at Secureworks. Like Microsoft and Mandiant, Secureworks has been tracking the group and observing its campaigns. He added that the group has demonstrated a “relentless focus on adaption” to pursue its espionage.

US government agencies, including the National Security Agency, the Cybersecurity and Infrastructure Security Agency (CISA), and the Justice Department published a joint advisory about Volt Typhoon’s activity today alongside Canadian, UK, and Australian intelligence. “Private sector partners have identified that this activity affects networks across US critical infrastructure sectors, and the authoring agencies believe the actor could apply the same techniques against these and other sectors worldwide,” the agencies wrote.

Although Chinese state-sponsored hackers have never launched a disruptive cyberattack against the United States—even over decades of data theft from US systems—the country’s hackers have periodically been caught inside US critical infrastructure systems. As early as 2009, US intelligence officials warned that Chinese cyberspies had penetrated the US power grid to “map” the country’s infrastructure in preparation for a potential conflict. Two years ago, CISA and the FBI also issued an advisory that China had penetrated US oil and gas pipelines between 2011 and 2013. China’s Ministry of State Security hackers have gone much further in cyberattacks against the country’s Asian neighbors, actually crossing the line of carrying out data-destroying attacks disguised as ransomware, including against Taiwan’s state-owned oil firm CPC.

This latest set of intrusions seen by Microsoft and Mandiant suggests that China’s critical infrastructure hacking continues. But even if the Volt Typhoon hackers did seek to go beyond espionage and lay the groundwork for cyberattacks, the nature of that threat is far from clear. State-sponsored hackers are, after all, often assigned to gain access to an adversary’s critical infrastructure as a preparatory measure in case of a future conflict, since gaining the access necessary for a disruptive attack usually requires months of advanced work.

- Advertisement -

ΑΠΑΝΤΗΣΤΕ

εισάγετε το σχόλιό σας!
παρακαλώ εισάγετε το όνομά σας εδώ

The reCAPTCHA verification period has expired. Please reload the page.

Ροή ειδήσεων

ΣΧΕΤΙΚΑ ΑΡΘΡΑ

China’s Military Intervention in Africa

Africa has become a critical arena for China’s military and security strategy beyond its border. The establishment of the PLA overseas base in Djibouti...

Rising Online Surveillance and Deteriorating Internet Freedom in Pakistan

Internet users in Pakistan have reported widespread connectivity issues, including delays in social media messages, difficulties uploading files, and problems sending voice notes. These...

Deep Waters, Dark Secrets – China’s Role in Baltic Cable Sabotage

A Chinese bulk carrier, ‘Yi Peng 3’ is under scrutiny for its possible involvement in damaging two critical undersea cables in the Baltic Sea. It...

Africa’s trade deficit with China continues to widen

African countries suffer from the trade deficit with China, which has continued to swell. In 2023, the exports from China were in surplus by...

ΔΗΜΟΦΙΛΗ ΑΡΘΡΑ

Αποκλειστικό: Και το Κατάρ ”μπαίνει” για ”μπίζνες” στη Συρία!

Το Κατάρ προσφέρει να βοηθήσει τη νέα συριακή κυβέρνηση στην αποκατάσταση των αεροδρομίων και στη διευκόλυνση της λειτουργίας διεθνών πτήσεων • Η αντιπροσωπεία της...

Αποκλειστικό: Προαναγγελία εκκαθάρισης των Κούρδων από Ερντογάν – Πολεμικό μανιφέστο κατά Ισραήλ!

Εκτός ελέγχου ο Ερντογάν: 1- «Η αυγή των όμορφων ημερών έχει αρχίσει να ξημερώνει.«Το έθνος μας πρέπει να συνεχίσει να προσεύχεται». 2- «Ανεξάρτητα από ποιανού προστασία...

Aποκλειστικό: Η στρατιωτική επέμβαση της Κίνας στην Αφρική

Η Αφρική έχει γίνει μια κρίσιμη αρένα για τη στρατιωτική στρατηγική και τη στρατηγική ασφάλειας της Κίνας πέρα ​​από τα σύνορά της. Η ίδρυση...

Αύξηση της διαδικτυακής επιτήρησης και επιδείνωση της ελευθερίας στο Διαδίκτυο στο Πακιστάν

Οι χρήστες του Διαδικτύου στο Πακιστάν έχουν αναφέρει εκτεταμένα προβλήματα συνδεσιμότητας, συμπεριλαμβανομένων καθυστερήσεων στα μηνύματα κοινωνικής δικτύωσης, δυσκολιών στη μεταφόρτωση αρχείων και προβλημάτων αποστολής...