security

Chinese malware targeting critical infrastructure, Microsoft and U.S. government warn – CBS News


Microsoft security researchers have unearthed a Chinese-sponsored hacking campaign targeting critical infrastructure in Guam and other unspecified locations within the United States, the tech giant warned on Wednesday. The hacker, code-named “Volt Typhoon,”  has been active since mid-2021 and “could disrupt critical communications infrastructure between the United States and Asia region during future crises.”

Microsoft has not detected any offensive attacks, but noted Chinese intelligence and military hackers routinely prioritize espionage and the gathering of information, rather than destruction.

U.S. federal law enforcement and intelligence agencies including the FBI, NSA and Cybersecurity and Infrastructure Security Agency (CISA) released a bulletin, Wednesday, outlining the actor’s ongoing operational playbook, as well as a roadmap of code that enables possible victims to detect the intruder.  

According to the bulletin, authorities “recently discovered” the cluster of activity. “Private sector partners have identified that this activity affects networks across U.S. critical infrastructure sectors, and the authoring agencies believe the actor could apply the same techniques against these and other sectors worldwide,” the brief continued. 

U.S. intelligence agencies first uncovered the malware in February, roughly the same time that the U.S. downed a Chinese spy balloon, the New York Times first reported. Activity by the Chinese-sponsored hacking group reportedly alarmed U.S. officials, given its proximity to Andersen Air Force Base. The naval port in Guam would play a critically important role in launching any U.S. military response in the event of a Taiwanese invasion. 

“Attacks against our critical infrastructure in the event of a Chinese invasion of Taiwan is unfortunately not farfetched,” CISA Director Jen Easterly warned in February

At the time, Easterly called the threat of cyber intrusions “far more dangerous” than the Chinese surveillance balloon.. 

“Our country is subject to cyber intrusions every day from the Chinese government, but these intrusions rarely make it into national news,” Easterly said. “These intrusions can do real damage to our nation — leading to theft of our intellectual property and personal information; and even more nefariously, establishing a foothold for disrupting or destroying the cyber and physical infrastructure that Americans rely upon every hour of every day—for our power, our water, our transportation, our communication, our healthcare, and so much more. 

Once Volt Typhoon gains access into a network, it steals user credentials in order to gain access to other computer systems, according to Microsoft. “Observed behavior suggests that the threat actor intends to perform espionage and maintain access without being detected for as long as possible,” Microsoft security researchers noted in Wednesday’s blog. 

Microsoft cautioned that affected organizations spanned nearly every critical infrastructure sector, including “communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors.”

Microsoft urged those customers impacted to “close or change credentials for all compromised accounts.”

China has consistently denied hacking into American networks, even after U.S. investigators accused the People’s Republic of China of stealing the personal information of millions of current and former federal workers under the Obama administration. 

For its part, the Biden White House has hurriedly established cybersecurity standards for critical infrastructure after elevating ransomware attacks, such as the 2021 Russia-linked offensive on Colonial Pipeline, to an issue of national security.



READ SOURCE

Readers Also Like:  ITS reminds users to install security updates – The Brock News - Brock University

This website uses cookies. By continuing to use this site, you accept our use of cookies.