Volt Typhoon Not The Only Chinese Crew Lurking In US Energy, Critical Networks
Volt Typhoon isn't the only Chinese spying crew infiltrating computer networks in America's energy sector and other critical organizations with the aim of wrecking equipment and causing other headaches, the US government has said.
This warning came within hours of Uncle Sam earlier today confirming Volt Typhoon had compromised "multiple" IT environments across communications, energy, transportation, water, and wastewater processing sectors in the United States. American officials said China's cyberspies were able to avoid detection and snoop around those networks, in some cases for up to five years. There is a fear that President Xi has instructed agents to sneak into America's key civil systems, and lay in wait to steal data and trigger disruption to vital services and supply lines as needed.
Volt Typhoon is certainly not the only Chinese group conducting this type of activity
"This stealthy access increases our concern that they are lurking, waiting for the right moment to cause devastating impact," said Cynthia Kaiser, deputy assistant director for the FBI's cybersecurity division, on a call with journalists Wednesday afternoon.
The Chinese snoops were seeking access to and information about organizations' operational technology to either position themselves for or gain vital information about these OT systems for future cyberattacks, she added.
Last week, the FBI said it obtained search warrants and issued a remote kill command to wipe Volt Typhoon's botnet after the gang infected hundreds of end-of-life routers with backdoor malware to break into critical infrastructure networks.
"But perhaps even more concerning is that Volt Typhoon is certainly not the only Chinese group conducting this type of activity," Kaiser noted. She declined to identify the other Beijing-backed gangs that have been found burrowing into US critical infrastructure.
The US Department of Energy's Mara Winn echoed this assessment, and noted that DoE has been working with energy system owners and operators "over the last several months" to detect compromised systems and stamp out the intruders.
"Our assessment is that the threat is actively positioning itself on critical infrastructure IT networks with the explicit goal of being able to disrupt the functioning of operational technology," said Winn, the deputy director for preparedness, policy, and risk assessment in the DOE's Office of Cybersecurity, Energy Security, and Emergency Response.
- US says China's Volt Typhoon is readying destructive cyberattacks
- FBI confirms it issued remote kill command to blow out Volt Typhoon's botnet
- Is critical infrastructure prepared for OT ransomware?
- We know nations are going after critical systems, but what happens when crims join in?
In the Feds' Wednesday warning, officials emphasized the importance of identity management for critical infrastructure owners and operators. This includes implementing phishing-resistant multi-factor authentication (MFA).
"What we see is these actors stealing administrative credentials and using those credentials to maintain persistent access to the network," CISA Executive Assistant Director for Cybersecurity Eric Goldstein said on the call with reporters.
OT systems could be manipulated to cause major shutdowns of essential services
"Those credentials allow the PRC to conduct any activity that those administrators would be able to conduct on the network, whether that's deleting information off the network, whether the changing credentials for other users or other kinds of activities," he added.
This is especially concerning given Volt Typhoon's interest in OT systems, according to John Hultquist, chief analyst at Google Cloud's Mandiant Intelligence. "OT systems could be manipulated to cause major shutdowns of essential services, or even to create dangerous conditions," he told The Register.
"Evidence of forays into OT systems justify our concerns that the actor is a serious threat," Hultquist added. "If there was any skepticism as to why this actor was carrying out these intrusions, this revelation should put it to rest."
Presumably the concept of infiltrating and backdooring foreign critical infrastructure just in case has not escaped the bright minds at the Pentagon either. ®
From Chip War To Cloud War: The Next Frontier In Global Tech Competition
The global chip war, characterized by intense competition among nations and corporations for supremacy in semiconductor ... Read more
The High Stakes Of Tech Regulation: Security Risks And Market Dynamics
The influence of tech giants in the global economy continues to grow, raising crucial questions about how to balance sec... Read more
The Tyranny Of Instagram Interiors: Why It's Time To Break Free From Algorithm-Driven Aesthetics
Instagram has become a dominant force in shaping interior design trends, offering a seemingly endless stream of inspirat... Read more
The Data Crunch In AI: Strategies For Sustainability
Exploring solutions to the imminent exhaustion of internet data for AI training.As the artificial intelligence (AI) indu... Read more
Google Abandons Four-Year Effort To Remove Cookies From Chrome Browser
After four years of dedicated effort, Google has decided to abandon its plan to remove third-party cookies from its Chro... Read more
LinkedIn Embraces AI And Gamification To Drive User Engagement And Revenue
In an effort to tackle slowing revenue growth and enhance user engagement, LinkedIn is turning to artificial intelligenc... Read more