China’s Cyber Warfare Rises: US Infrastructure Under Digital Siege

December 18, 2023
1 min read
  • Chinese state-sponsored hackers have made significant advances in 2023, escalating cyber warfare by targeting U.S. infrastructure and government agencies for intelligence collection and system breaches.
  • Experts warn of a probable correlation between Beijing’s 2021 Data Security Law, mandating technology companies to report software vulnerabilities within 48 hours, and the enhanced capabilities demonstrated by Chinese hackers in recent attacks.

In a year marked by increasing tensions in cyberspace, 2023 has seen a marked escalation in Chinese cyber warfare against the U.S. State-sponsored hackers from China have broadened their operations from stealing commercial secrets and personnel information to gathering intelligence on U.S. government agencies and infiltrating infrastructure systems of strategic value.

In May, it was revealed that a Chinese state-sponsored hacking group had installed malware in U.S. electric grids, inciting concerns over potential disruptions to military power in case of a Chinese invasion of Taiwan. Government agencies, including the U.S. State Department, have also been affected, with China-based hackers gaining email access affecting multiple organizations.

This increase in cyber attacks coincides with improvements in the capability and sophistication of Chinese hackers’ techniques. Further hacks have reportedly allowed them access to U.S. infrastructure sites such as a major port, oil and gas pipeline, and a water utility in Hawaii. This expansion suggests an attempt to pre-position for potential disruption or destruction of critical infrastructure in the event of a conflict.

The rumored connection between Beijing’s Data Security Law of 2021 and the currently observed advancements in Chinese cyber warfare draws further concern. This law requires tech companies doing business in China to report their software vulnerabilities to China’s Ministry of Industry and Information Technology (MIIT) within 48 hours of discovery. Allowing Beijing to monitor these vulnerabilities may have inadvertently provided a head start to Chinese hackers, providing early insight into exploitable software vulnerabilities.

This legal environment has put foreign technology companies in a difficult position concerning their business in China. If they choose to comply with the vulnerability disclosure requirement, they could be exposing their own data security, their clients’, and even their homeland’s national security to critical risks.

As tensions rise, the increased cyber espionage activity represents a significant threat to U.S. government and private-sector networks. Accordingly, companies and state agencies must navigate carefully to protect their digital assets while managing their business operations within China’s evolving regulatory framework.

Latest from Blog

Bridging the cyber talent gap: tips for CISOs

TLDR: – Global cyber threats have increased twofold in recent years, leading to a talent gap of nearly 4 million cyber professionals worldwide. – Existing cyber staff are under strain, with vacancies

North Korean hackers pivot to ransomware attacks

TLDR: North Korean hackers from APT45 have shifted from cyber espionage to ransomware attacks APT45 has targeted critical infrastructure and is linked to ransomware families SHATTEREDGLASS and Maui A North Korea-linked threat