The agencies include the U.S. National Security Agency, the FBI, the Cybersecurity and Infrastructure Security Agency (CISA), and their counterparts from Australia, New Zealand, Canada, and the UK. and other intelligence partners noted in a j oint cybersecurity advisory that they believe that China’s Volt Typhoon campaign could target other critical infrastructures abroad. “There is high vulnerability when cables land on shore,” he said. military facilities play a major role in responding to conflicts in the Asia-Pacific region. Guam also serves as a major communications center linking Asia and Australia to the United States, via submarine cables.īart Hoggeveen, a senior analyst at the Australian Strategic Policy Institute, said the submarine cables made Guam “a logical target” for China’s ruling communist party to seek intelligence. This includes various networks in Guam in the western Pacific where the United States has a major military presence, Microsoft noted. It wasn’t immediately clear how many networks have been affected. critical sectors include “the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors.” The China-based hacking group is believed to be pursuing capabilities to “disrupt critical communications infrastructure between the United States and Asia region during future crises,” according to Microsoft.Īffected U.S. The American multinational technology giant added that Volt Typhoon appears to intend “to perform espionage and maintain access without being detected for as long as possible.” Microsoft announced on May 24 that the “stealthy and targeted malicious activity” is carried out by Volt Typhoon, a state-sponsored actor based in China that usually spies and gathers information on targets. critical infrastructure sectors, from telecommunications to transportation hubs, since at least mid-2021, according to Microsoft and various cybersecurity agencies under the Five Eyes alliance. A Chinese cyber espionage group has been targeting a wide range of networks across U.S.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |