{"id":1120117,"date":"2023-12-19T01:34:34","date_gmt":"2023-12-19T06:34:34","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/chinas-cyber-warfare-surges-with-hacking-of-u-s-infrastructure-the-federalist\/"},"modified":"2023-12-19T01:34:34","modified_gmt":"2023-12-19T06:34:34","slug":"chinas-cyber-warfare-surges-with-hacking-of-u-s-infrastructure-the-federalist","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/federalist\/chinas-cyber-warfare-surges-with-hacking-of-u-s-infrastructure-the-federalist\/","title":{"rendered":"China&#8217;s Cyber Warfare Surges With Hacking Of U.S. Infrastructure &#8211; The Federalist"},"content":{"rendered":"<p><p>    2023 will go down in history as the year that Chinas    state-sponsored hackers advanced their ability to wage cyber    warfare against the U.S.  <\/p>\n<p>    Chinese hackers used to focus on stealing Americas commercial    secrets and personnel information (see exampleshere and here). But this    year, Chinese hackers have expanded their reach by collecting    intelligence on U.S. government agencies and breaching systems    of infrastructures with strategic value.  <\/p>\n<p>    In May 2023, The New York Times reported that a    Chinese state-sponsored hacking group had installed malware in    electric grids in Guam and other parts of the U.S. since    February 2023, probably seeking to cut off power to the U.S.    military in case China invades Taiwan.  <\/p>\n<p>    Microsoftdisclosed in July    that China-based hackers gained access to email accounts    affecting approximately 25 organizations in the public cloud,    including government agencies as well as related consumer    accounts of individuals, since May 15, 2023. The affected    government agencies included the U.S. State Department. U.S.    national security officials identified the    hackers as affiliated with Chinese intelligence. Google Clouds    Mandiant senior vice president and chief technical officer,    Charles Carmakal, called Chinese    hackers techniques very advanced.  <\/p>\n<p>    Then, last week,DailyMail.com    reported that Chinese hackers affiliated with the Peoples    Liberation Army have gained access to essential infrastructure    sites in the U.S., including a water utility in Hawaii, a major    port, and at least one oil and gas pipeline. The hackers    access to the water utility in Hawaii is probably of the utmost    concern since the U.S. Pacific fleet resides near the island of    Oahu. Chinese hackers had been sitting on a stockpile of    strategic vulnerabilities without being detected for almost a    year.  <\/p>\n<p>    Brandon Wales of the Cybersecurity and Infrastructure Security    Agencysaid, It is very    clear that Chinese attempts to compromise critical    infrastructure are in part to pre-position themselves to be    able to disrupt or destroy that critical infrastructure in the    event of a conflict.  <\/p>\n<p>    For example, if the Chinese Communist Party invades Taiwan,    Chinese military-affiliated hackers will likely disrupt    critical infrastructure in the United States. Wales said the    hackers will try either to prevent the United States from    being able to project power into Asia or to cause societal    chaos inside the United States  to affect our decision-making    around a crisis.  <\/p>\n<p>    Chinas state-sponsored hackers are relentless, and they have    received the states assistance to enhance their abilities. For    example, Beijing passed aData Security Lawin 2021.    It includes a provision that    requires technology companies doing business in China to report    their software vulnerabilities to Chinas Ministry of Industry    and Information Technology (MIIT) within 48 hours after the    issue became known. The MIIT then adds such vulnerabilities to    a National Vulnerability Database and generates vulnerability    reports.  <\/p>\n<p>    The Chinese government claims such a database and its reports    are necessary for researchers to learn how to fix those    software vulnerabilities and enhance cybersecurity. Beijing    omitted to mention that MIIT shares its software vulnerability    reports with other Chinese government agencies. These include    Chinas Ministry of State Security (MSS), the nations leading    spy agency.  <\/p>\n<p>    MSSs activities include performing domestic    counterintelligence, gathering foreign intelligence, conducting    overseas influence campaigns, and organizing hacking. Last    year, the U.S. Justice Departmentcharged13    individuals, including a few members of MSS, for alleged    efforts to unlawfully exert influence in the United States for    the benefit of the government of the PRC. The agency was also    behind some of themost disruptive    overseas hacking operationsin recent years.  <\/p>\n<p>    Shanghai Jiao Tong University and the security firm Beijing    Topsec, two entities known for working with the PLA to carry    out hacking campaigns, also have access to MIITs vulnerability    reports.  <\/p>\n<p>    Another serious concern of this Chinese law is that it mandates    companies to disclose any software vulnerabilities within two    days of discovery, even though the average time it takes to    patch its software flaws is between60    daysandmore than 200    days.  <\/p>\n<p>    Brad Williams, writing forBreaking Defense,warnedthat    Chinas new law essentially has given its state-sponsored    hackers a head start. It provides them with nearly exclusive    early access to a steady stream of zero-day vulnerabilities of    software used by other countries, including the U.S. The law    gives Chinese hackers plenty of time to exploit those    vulnerabilities and advance their hacking abilities.  <\/p>\n<p>    How many American companies have complied with Chinas software    vulnerability reporting mandate is unclear. Williams named two    U.S. companies, Amazon Web Services and Microsoft, which have    business operations in China and likely must comply with the    software vulnerability disclosure requirement.  <\/p>\n<p>    Unfortunately, both companies also have a significant presence    in both the public and private sectors in the U.S. Their    compliance with Chinese law could potentially include those    discovered in technologies used by the Defense Department and    Intelligence Community in the U.S. Even a mere description of    a bug with the required level of specificity would provide a    lead for Chinas offensive hackers as they search for new    vulnerabilities to exploit, according toWIRED    magazine.  <\/p>\n<p>    It is not a coincidence that since Beijing enacted mandatory    software vulnerability reporting, Chinas hackers have    demonstrated an enhanced ability to breach into more    strategically sensitive systems in the West, especially in the    U.S. The Director of National Intelligences 2023 Annual Threat    Assessment states,China probably    currently represents the broadest, most active, and persistent    cyber espionage threat to U.S. Government and private-sector    networks.  <\/p>\n<p>    The PLA has every intention to incorporate cyber warfare as    part of its war planning against Taiwan and its allies. Foreign    technology companies in China have a decision to make: Will    they continue chasing short-term profits and market access in    China, even if it means sharing software vulnerabilities? Or    should they pack up and leave the hostile legal environment in    China? Their decision will affect not only their own data    security and that of their customers but also the national    security of their homeland and allies.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/thefederalist.com\/2023\/12\/18\/this-means-cyber-war-chinese-hackers-target-critical-u-s-infrastructure\" title=\"China's Cyber Warfare Surges With Hacking Of U.S. Infrastructure - The Federalist\">China's Cyber Warfare Surges With Hacking Of U.S. Infrastructure - The Federalist<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 2023 will go down in history as the year that Chinas state-sponsored hackers advanced their ability to wage cyber warfare against the U.S.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/federalist\/chinas-cyber-warfare-surges-with-hacking-of-u-s-infrastructure-the-federalist\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[487839],"tags":[],"class_list":["post-1120117","post","type-post","status-publish","format-standard","hentry","category-federalist"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1120117"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1120117"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1120117\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1120117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1120117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1120117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}