Techno Blender
Digitally Yours.

Chinese hackers infiltrated critical US infra like train, water systems ages ago, lurked in shadows for 5 years

0 39


A team of state sponsored hackers from China had broken into critical infrastructure systems in the US, including railways and water systems, and were hiding within the system for 5 years, a recent statement from the US National Security Agency, US cyber watchdog CISA has revealed

American and allied intelligence agencies issued a joint statement on Wednesday, revealing the ongoing activity of an advanced group of Chinese hackers targeting critical US infrastructure, according to a report in The Guardian.

Known as Volt Typhoon, this group has been operating for up to five years, infiltrating networks across various sectors including aviation, rail, mass transit, highway, maritime, pipeline, water, and sewage.

While specific organizations were not named, the statement disclosed that the hackers have maintained access and footholds within some victim IT environments for an extended period.

Related Articles

US

US Ambassador to Beijing hacked in China-linked spying operation

US

Canada alleges Chinese involvement in hacking government network

The statement, signed by the US National Security Agency, US cyber watchdog CISA, the FBI, and the Transportation Security Administration, along with cybersecurity agencies from Britain, Australia, Canada, and New Zealand, highlights the seriousness of the threat posed by Volt Typhoon.

Unlike typical espionage-focused cyberattacks, Volt Typhoon’s activities appear geared towards sabotage, raising concerns among officials.

This heightened threat level has prompted discussions between the White House and private technology industry leaders, including telecommunications and cloud computing companies, to seek assistance in tracking and mitigating the hackers’ actions.

Eric Goldstein, a senior official at CISA, expressed deep concern about the malicious cyber activity originating from China, emphasizing that most of the identified victims offer no legitimate espionage value.

The joint statement underscores the urgent need for enhanced cybersecurity measures to defend against such attacks on critical infrastructure.


Chinese hackers infiltrated critical US infra like train, water systems ages ago, lurked in shadows for 5 years

A team of state sponsored hackers from China had broken into critical infrastructure systems in the US, including railways and water systems, and were hiding within the system for 5 years, a recent statement from the US National Security Agency, US cyber watchdog CISA has revealed

American and allied intelligence agencies issued a joint statement on Wednesday, revealing the ongoing activity of an advanced group of Chinese hackers targeting critical US infrastructure, according to a report in The Guardian.

Known as Volt Typhoon, this group has been operating for up to five years, infiltrating networks across various sectors including aviation, rail, mass transit, highway, maritime, pipeline, water, and sewage.

While specific organizations were not named, the statement disclosed that the hackers have maintained access and footholds within some victim IT environments for an extended period.

Related Articles

US

US Ambassador to Beijing hacked in China-linked spying operation

US

Canada alleges Chinese involvement in hacking government network

The statement, signed by the US National Security Agency, US cyber watchdog CISA, the FBI, and the Transportation Security Administration, along with cybersecurity agencies from Britain, Australia, Canada, and New Zealand, highlights the seriousness of the threat posed by Volt Typhoon.

Unlike typical espionage-focused cyberattacks, Volt Typhoon’s activities appear geared towards sabotage, raising concerns among officials.

This heightened threat level has prompted discussions between the White House and private technology industry leaders, including telecommunications and cloud computing companies, to seek assistance in tracking and mitigating the hackers’ actions.

Eric Goldstein, a senior official at CISA, expressed deep concern about the malicious cyber activity originating from China, emphasizing that most of the identified victims offer no legitimate espionage value.

The joint statement underscores the urgent need for enhanced cybersecurity measures to defend against such attacks on critical infrastructure.

FOLLOW US ON GOOGLE NEWS

Read original article here

Denial of responsibility! Techno Blender is an automatic aggregator of the all world’s media. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials, please contact us by email – [email protected]. The content will be deleted within 24 hours.

Leave a comment