US disabled Chinese hacking network targeting critical infrastructure,
sources say
Send a link to a friend
[January 30, 2024]
By Christopher Bing and Karen Freifeld
(Reuters) -The U.S. government in recent months launched an operation to
fight a pervasive Chinese hacking operation that successfully
compromised thousands of internet-connected devices, according to two
Western security officials and one person familiar with the matter.
The Justice Department and Federal Bureau of Investigation sought and
received legal authorization to remotely disable aspects of the Chinese
hacking campaign, the sources told Reuters.
The Biden administration has increasingly focused on hacking, not only
for fear nation states may try to disrupt the U.S. election in November,
but because ransomware wreaked havoc on Corporate America in 2023.
The hacking group at the center of recent activity, Volt Typhoon, has
especially alarmed intelligence officials who say it is part of a larger
effort to compromise Western critical infrastructure, including naval
ports, internet service providers and utilities.
While the Volt Typhoon campaign initially came to light in May 2023, the
hackers expanded the scope of their operations late last year and
changed some of their techniques, according to three people familiar
with the matter.
The widespread nature of the hacks led to a series of meetings between
the White House and private technology industry, including several
telecommunications and cloud commuting companies, where the U.S.
government asked for assistance in tracking the activity.
Such breaches could enable China, national security experts said, to
remotely disrupt important facilities in the Indo-Pacific region that in
some form support or service U.S. military operations. Sources said U.S.
officials are concerned the hackers were working to hurt U.S. readiness
in case of a Chinese invasion of Taiwan.
China, which claims democratically governed Taiwan as its own territory,
has increased its military activities near the island in recent years in
response to what Beijing calls "collusion" between Taiwan and the United
States.
[to top of second column]
|
China's and U.S.' flags are seen printed on paper in this
illustration taken January 27, 2022. REUTERS/Dado Ruvic/Illustration
The Justice Department and FBI declined to comment. The Chinese
embassy in Washington did not immediately respond to a request for
comment.
When Western nations first warned about Volt Typhoon in May, Chinese
foreign ministry spokesperson Mao Ning said the hacking allegations
were a "collective disinformation campaign" from the Five Eyes
countries, a reference to the intelligence sharing grouping of
countries made up of the United States, Canada, New Zealand,
Australia and the UK.
Volt Typhoon has functioned by taking control of swaths of
vulnerable digital devices around the world - such as routers,
modems, and even internet-connected security cameras - to hide
later, downstream attacks into more sensitive targets, security
researchers told Reuters. This constellation of remotely controlled
systems, known as a botnet, are of primary concern to security
officials because they limit the visibility of cyber defenders that
monitor for foreign footprints in their computer networks.
"How it works is the Chinese are taking control of a camera or modem
that is positioned geographically right next to a port or ISP
(internet service provider) and then using that destination to route
their intrusions into the real target," said a former official
familiar with the matter. "To the IT team at the downstream target
it just looks like a normal, native user that's sitting nearby."
The use of so-called botnets by both government and criminal hackers
to launder their cyber operations is not new. The approach is often
used when an attacker wants to quickly target numerous victims
simultaneously or seeks to hide their origins.
(Reporting by Christopher Bing in Washington, Karen Freifeld in New
York and James Pearson in London; Editing by Chris Sanders and Lisa
Shumaker)
[© 2024 Thomson Reuters. All rights reserved.]This material
may not be published, broadcast, rewritten or redistributed.
Thompson Reuters is solely responsible for this content. |