Chinese government hackers digs deep into U.S. infrastructure

Share post:

According to Kaspersky, New York Times, and Microsoft, Chinese government hackers are digging deep into U.S. infrastructure.

The Kaspersky report says a group called Zirconium employed advanced eavesdropping technologies to build a “permanent channel for data exfiltration” in industrial infrastructure. Another New York Times story exposed the actions of a second Chinese government-linked outfit called Volt Typhoon, which carried malware capable of destroying key infrastructure at U.S. military locations throughout the world.

Zirconium’s operations span various industries, including government, financial, aerospace, defense, technology, construction, engineering, telecommunications, media, and insurance. The group used 15 implants to gather sensitive data from targeted networks, employing DLL hijackings to mask their activities and avoid detection.

Volt Typhoon, on the other hand, targeted key infrastructure, potentially interrupting communications and power supplies to US military locations. The spyware they placed constituted a huge risk, with the ability to disrupt not just military activities but also the daily lives of regular Americans.

A unknown Chinese hacker outfit, according to a third report issued by Microsoft, penetrated the email accounts of 25 of its cloud clients, including the U.S. Departments of State and Commerce.

Concerns have been expressed concerning the scope of Chinese government hacking and the potential for these assaults to do significant harm to U.S. infrastructure. The Biden administration has described the claims as “deeply concerning” and stated that actions are being taken to counter the threat. China has labeled the reports “propaganda.”

The sources for this piece include an article in ArsTechnica.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for the week ending Friday, Sept. 29, 2023

This episode features discussion on October Security Awareness Month, ransomware, teenage hackers and the start of hearings into proposed Canadian privacy a

Admins urged to quickly patch holes in WS_FTP file transfer server

This is the fourth file transfer application -- and the second from Progress Software -- to recently face critical vulne

Cyber Security Today, Sept. 29, 2023 – Protect your routers from this attacker, new open-source malware packages found, and more

This episode reports on a China-based group that specializes in hacking branch office routers of major

Champagne squeezed to produce proposed amendments on privacy, AI bills

Opposition gives government five business days to produce proposed

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways