More
    HomeAsian NewsChinese hackers preparing for conflict with US, cyber official says

    Chinese hackers preparing for conflict with US, cyber official says

    Published on

    Chinese hackers are positioning themselves in U.S. critical infrastructure IT networks for a potential clash with the United States, a top American cybersecurity official said Friday.

    Morgan Adamski, executive director of U.S. Cyber Command, said Chinese-linked cyber operations are aimed at gaining an advantage in case of a major conflict with the United States.

    Officials have warned that China-linked hackers have compromised IT networks and taken steps to carry out disruptive attacks in the event of a conflict. Their activities include gaining access to key networks to enable potential disruptions such as manipulating heating, ventilation and air-conditioning systems in server rooms, or disrupting critical energy and water controls, U.S. officials said earlier this year.

    Beijing routinely denies cyber operations targeting U.S. entities. The Chinese Embassy in Washington did not immediately respond to a request for comment.

    Adamski was speaking to researchers at the Cyberwarcon security conference in Arlington, Virginia. On Thursday, U.S. Senator Mark Warner told The Washington Post a suspected China-linked hack on U.S. telecommunications firms was the worst telecom hack in U.S. history.

    That cyber espionage operation, dubbed “Salt Typhoon,” has included stolen call records data, compromised communications of top officials of both major U.S. presidential campaigns before the November 5 election, and telecommunications information related to U.S. law enforcement requests, the FBI said recently.

    The FBI and Cybersecurity and Infrastructure Security Agency are providing technical assistance and information to potential targets, the bureau said.

    Adamski said Friday that the U.S. government has “executed globally synchronized activities, both offensively and defensively minded, that are laser-focused on degrading and disrupting PRC cyber operations worldwide.”

    Public examples include exposing operations, sanctions, indictments, law enforcement actions and cybersecurity advisories, with input from multiple countries, Adamski said.

    Source link

    Latest articles

    Aramco bags Innovation Award – Saudi Arabia at Asian Oil & Gas Awards 2024

    The energy and chemicals company was recognised for its development & deployment of the...

    Malaysia’s Mahathir: How Asia can lead the way in ‘superaging’ world

    KUALA LUMPUR -- When it comes to aging leaders, Donald Trump has nothing on...

    ‘Interior Chinatown’ vs the Asian American Canon, Part I – The Nerds of Color

    An Epigraph, Which May Be Innocently Mistaken For Deep Eastern Wisdom: A “trope” isn’t...

    More like this

    ‘Interior Chinatown’ vs the Asian American Canon, Part I – The Nerds of Color

    An Epigraph, Which May Be Innocently Mistaken For Deep Eastern Wisdom: A “trope” isn’t...

    Struggling with Identity as an Asian American

    The opinions expressed in this article are the writer’s own and do not reflect...

    Asian American doll company Jilly Bing releases mixed Asian and white doll

    Jilly Bing, a company known for its Asian American dolls, has launched its first...