FBI warns China about targeting critical infrastructure for cyber attacks

April 19, 2024
1 min read



TLDR:

– FBI Director Christopher Wray stated that China-sponsored hackers have been pre-positioning for potential cyberattacks against U.S. critical infrastructure since 2011.

– Chinese government officials denied any connection to the hacking group Volt Typhoon that has been hiding in key U.S. systems for at least five years.

In a recent security conference at Vanderbilt University, FBI Director Christopher Wray revealed that Chinese government-backed hackers have been targeting U.S. critical infrastructure for over a decade. The hackers, associated with a group known as Volt Typhoon, have been pre-positioning in key systems, waiting for an opportunity to strike. This revelation comes after warnings in February from multiple U.S. agencies about Chinese hackers lurking in crucial sectors like communications, energy, and transportation.

Despite the denial by Chinese officials regarding any state sponsorship of Volt Typhoon, General Timothy Haugh, who leads both the NSA and U.S. Cyber Command, criticized China’s behavior in cyberspace. He highlighted China’s deliberate campaign to challenge the U.S. and its allies technologically, putting critical systems at risk. The DIA report also pointed out China’s use of cyberspace for malicious activities and cyberattacks, including paralyzing adversary information systems during conflicts.

Overall, the FBI’s call out of China for making critical infrastructure “fair game” for cyber operations showcases the ongoing cybersecurity threats posed by state-sponsored hacking groups. The constant penetration and pre-positioning in U.S. systems demonstrate the need for heightened vigilance and cybersecurity measures to protect against potential cyberattacks.


Latest from Blog

EU push for unified incident report rules

TLDR: The Federation of European Risk Management Associations (FERMA) is urging the EU to harmonize cyber incident reporting requirements ahead of new legislation. Upcoming legislation such as the NIS2 Directive, DORA, and