China calls allegations that it infiltrated US critical infrastructure a ‘political farce’


China has denied claims by the US government and Microsoft that a state-sponsored hacking group called Volt Typhoon infiltrated critical US infrastructure. Bloomberg. The country’s National Computer Virus Emergency Response Center called the claims a “political farce” orchestrated by US officials in a new report. More than 50 cybersecurity experts also reportedly agreed with the agency that there was insufficient evidence linking Typhoon Volt to the Chinese government.

Moreover, the Chinese agency said that it is the United States that uses “cyber warfare powers” to penetrate networks and gather intelligence. He even accused the US of using a tool called “Marble” that could insert lines of code in Chinese and Russian. Russia according to the activity.

First, Microsoft and the National Security Agency (NSA). informed About Typhoon Volt in May 2023. They said the group installed surveillance malware on “critical” systems on Guam and elsewhere in the US and had access to those systems for at least the past five years. In February of this year, the Cybersecurity and Infrastructure Security Agency (CISA), the NSA and the FBI gave advice Warning to critical infrastructure organizations that state-sponsored cyber actors from China are “attempting to preemptively position IT networks for disruptive or destructive cyber attacks.”

US agencies reported that Volt Typhoon leaked to the US Department of Energy, the US Environmental Protection Agency, as well as various government agencies in Australia, Great Britain, Canada and New Zealand. Volt Typhoon does not act like other cyber attackers and espionage groups. He hasn’t used the malware he installed to attack any of his targets – at least not yet. The group is “pre-positioning” itself so that it can disrupt critical infrastructure functions at will, according to the US government, “in the event of potential geopolitical tensions and/or military conflicts” with the United States.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *