11.8 C
Athens
Πέμπτη, 26 Δεκεμβρίου, 2024

US disabled Chinese hacking network targeting critical infrastructure

Περισσότερα Νέα

- Advertisement -

 The U.S. government in recent months launched an operation to fight a pervasive Chinese hacking operation that compromised thousands of internet-connected devices, two Western security officials and a person familiar with the matter said.

The Justice Department and Federal Bureau of Investigation sought and received legal authorization to remotely disable aspects of the Chinese hacking campaign, the sources told Reuters.

The Biden administration has increasingly focused on hacking, not only for fear nation states may try to disrupt the U.S. election in November, but because ransomware wreaked havoc on Corporate America in 2023.

The hacking group at the center of recent activity, Volt Typhoon, has especially alarmed intelligence officials who say it is part of a larger effort to compromise Western critical infrastructure, including naval ports, internet service providers and utilities.

While the Volt Typhoon campaign initially came to light in May 2023, the hackers expanded the scope of their operations late last year and changed some of their techniques, according to three people familiar with the matter.

- Advertisement -

The widespread nature of the hacks led to a series of meetings between the White House and private technology industry, including several telecommunications and cloud computing companies, where the U.S. government asked for assistance in tracking the activity.

Such breaches could enable China, national security experts said, to remotely disrupt important facilities in the Indo-Pacific region that in some form support or service U.S. military operations. Sources said U.S. officials are concerned the hackers were working to hurt U.S. readiness in case of a Chinese invasion of Taiwan.

China, which claims democratically governed Taiwan as its own territory, has increased its military activities near the island in recent years in response to what Beijing calls “collusion” between Taiwan and the United States.

The Justice Department and FBI declined to comment. The Chinese embassy in Washington did not immediately respond to a request for comment.
China’s foreign ministry called the accusations “groundless” and “extremely irresponsible”, and said it was the U.S. that was “the initiator and master of cyber attacks”.
“Since last year, China’s network security agencies have issued reports one after another, revealing that the U.S. government has carried out cyber attacks on China’s key infrastructure for a long time. Such irresponsible policies and practices put the global critical infrastructure at great risk,” ministry spokesperson Wang Wenbin told a regular news conference on Thursday.

When Western nations first warned about Volt Typhoon in May, Chinese foreign ministry spokesperson Mao Ning said the hacking allegations were a “collective disinformation campaign” from the Five Eyes countries, a reference to the intelligence sharing grouping of countries comprising Australia, Canada, New Zealand, the United Kingdom and the United States.

Volt Typhoon has functioned by taking control of vulnerable digital devices around the world – such as routers, modems, and even internet-connected security cameras – to hide later, downstream attacks into more sensitive targets, security researchers told Reuters.

This constellation of remotely controlled systems, known as a botnet, is of primary concern to security officials because it limits the visibility of cyber defenders that monitor for foreign footprints in their computer networks.

“How it works is the Chinese are taking control of a camera or modem that is positioned geographically right next to a port or ISP (internet service provider) and then using that destination to route their intrusions into the real target,” said a former official familiar with the matter. “To the IT team at the downstream target it just looks like a normal, native user that’s sitting nearby.”

The use of botnets by both government and criminal hackers to launder their cyber operations is not new. The approach is often used when an attacker wants to quickly target numerous victims simultaneously or seeks to hide their origins.

- Advertisement -

ΑΠΑΝΤΗΣΤΕ

εισάγετε το σχόλιό σας!
παρακαλώ εισάγετε το όνομά σας εδώ

The reCAPTCHA verification period has expired. Please reload the page.

Ροή ειδήσεων

ΣΧΕΤΙΚΑ ΑΡΘΡΑ

Pakistan’s Security Challenges Threaten to Undermine Its Relationship with China

China and Pakistan have long enjoyed close relations, often described as an “ironclad friendship.” However, the historically close relationship between Pakistan and China is...

China’s Military Intervention in Africa

Africa has become a critical arena for China’s military and security strategy beyond its border. The establishment of the PLA overseas base in Djibouti...

Rising Online Surveillance and Deteriorating Internet Freedom in Pakistan

Internet users in Pakistan have reported widespread connectivity issues, including delays in social media messages, difficulties uploading files, and problems sending voice notes. These...

Deep Waters, Dark Secrets – China’s Role in Baltic Cable Sabotage

A Chinese bulk carrier, ‘Yi Peng 3’ is under scrutiny for its possible involvement in damaging two critical undersea cables in the Baltic Sea. It...

ΔΗΜΟΦΙΛΗ ΑΡΘΡΑ

Ελλάδα, Ινδία και Αίγυπτος συντονίζουν τον στρατηγικό βηματισμό τους!-Επί έναν μήνα, μαχητικά και πιλότοι από τις τρεις χώρες έγιναν ένα

Ελλάδα, Ινδία και Αίγυπτος συντονίζουν τον στρατηγικό βηματισμό τους, με τις ένοπλες δυνάμεις των «τριών» να πραγματοποιούν ασκήσεις με στόχο την εμβάθυνση και των...

Νέο ανατριχιαστικό βίντεο από τη στιγμή της πτώσης του αεροσκάφους της Azerbaijan Airlines

H φρικτή στιγμή που ένα επιβατικό αεροσκάφος με 72 επιβαίνοντες συνετρίβη στην πόλη Ακτάου του Καζακστάν μέσα σε μια μπάλα φωτιάς, την Τετάρτη (25/12), καταγράφηκε σε...

Επικοινωνία Λόιντ Όστιν με Γιασάρ Γκιουλέρ – «Οι ΗΠΑ δεν θέλουν τουρκική εισβολή στη Συρία»

Να συγκρατήσουν την Τουρκία από το να εισβάλει στη Βορειοανατολική Συρία επιχειρούν οι ΗΠΑ όπως μεταδίδει ο ΣΚΑΪ. Ο Αμερικανός υπουργός Άμυνας Λόιντ Όστιν...

Ουκρανία: Ρωσικός πύραυλος διέσχισε τον εναέριο χώρο της Μολδαβίας και της Ρουμανίας

Ρωσικός πύραυλος που είχε στόχο την Ουκρανία διέσχισε τον εναέριο χώρο της Μολδαβίας και της Ρουμανίας κατά τη διάρκεια μαζικής επίθεσης που εξαπέλυσε η...