World

China-backed hackers targeting critical US infrastructure: Five Eyes

Western intel group says it believes methods could be used against others as well

Updated 11 months ago · Published on 25 May 2023 4:00PM

China-backed hackers targeting critical US infrastructure: Five Eyes
Microsoft says it has uncovered ‘stealthy and targeted malicious activity’ aimed at ‘critical infrastructure’ in the United States. – Pixabay pic, May 25, 2023

WASHINGTON – Western intelligence agencies today issued a joint advisory to highlight the targeting of US critical infrastructure by a China-sponsored malicious cyber actor and help users hunt such activity on their devices, reported German news agency (dpa).

Agencies in the United States, Canada, Australia, New Zealand, and Britain published a joint advisory sharing technical details on “the recently discovered cluster of activity... associated with a People’s Republic of China state-sponsored cyber actor, also known as Volt Typhoon”.

“Private sector partners have identified that this activity affects networks across US critical infrastructure sectors, and the authoring agencies believe the actor could apply the same techniques against these and other sectors worldwide,” the advisory said.

Separately, Microsoft said in a blog post today that it “uncovered stealthy and targeted malicious activity focused on post-compromise credential access and network system discovery aimed at critical infrastructure organisations in the United States”.

According to Microsoft, Volt Typhoon “typically focuses on espionage and information gathering”. 

“Microsoft assesses with moderate confidence that this Volt Typhoon campaign is pursuing development of capabilities that could disrupt critical communications infrastructure between the United States and Asia region during future crises,” the tech company said.

Microsoft said that the group, active since mid-2021, has targeted critical infrastructure organisations in the US territory of Guam and elsewhere in the country, adding that the target of the activities appears to be to “perform espionage and maintain access without being detected for as long as possible”.

The company said organisations affected by the malicious campaign include maritime, government, and information technology, among others. – Bernama, May 25, 2023

Related News

Malaysia / 15h

Sanctions on 4 Malaysia-based companies still in place, says US official

Business / 2w

US court orders J&J, Kenvue to pay US$45 million over death of baby powder user

Business / 1mth

Malaysia bids to become Southeast Asian digital hub in collaboration with Microsoft

World / 2mth

Rise of three-nation partnership to fight menace of cyber threats in region

World / 2mth

Not made in China: Australia eyes other big opportunities in Asia

Malaysia / 2mth

What more must the authorities do to combat online scams?

Spotlight

Malaysia

Nurul Izzah calls for pressure on Israel, its allies over ‘catastrophe’ in Rafah

Malaysia

Sarawak deputy minister says nothing achieved yet on push to increase state’s MPs

By Desmond Davidson

Malaysia

Senate president in serious medical condition, says Sarawak deputy minister

By Desmond Davidson

Malaysia

JDT player’s car smashed with hammer in latest attack on footballers

Malaysia

Communicate better on Padu, economists tell Putrajaya

By Alfian Z.M. Tahir

Malaysia

Uprooted tree inspected by arborists every 2 years, says Dr Zaliha

You may be interested

World

AstraZeneca Covid-19 vaccine to be withdrawn globally