Chinese state-sponsored hackers have infiltrated key US infrastructure networks, according to what the United States, its Western allies and Microsoft have announced, in light of warnings of similar attacks the world is likely to witness today. among the sites targeted by the hackers, but pointed to tracking “malicious” activity in other American regions of the US in the event of conflict in the region.
In a statement Wednesday, it said that “Microsoft assesses with moderate confidence that the Typhoon Shelter campaign is designed to develop capabilities that could disrupt basic communications infrastructure between the United States and the Asian region during future crises.
He added: “Entities affected by this campaign include telecommunications, industry, utilities, transportation, construction, maritime transport, government, information technology and the education sector.”
Microsoft’s announcement coincided with warnings issued by US, Canadian, New Zealand and UK authorities that e-piracy is likely to occur worldwide.
She added: “These actions affect networks in various sectors of basic infrastructure, and the responsible agencies believe that the party in charge of them can use the same technologies in relation to these and other sectors around the world.”
“This is clearly a collective disinformation campaign by the Five Eyes coalition countries launched by the United States for geopolitical purposes,” Chinese Foreign Ministry spokeswoman Mao Ning said, referring to the security alliance that includes the United States and its Western allies, who formed report, and continued: “Involvement of some companies. It appears that in addition to government organizations, the United States is expanding its channels for spreading disinformation.” But no change in tactics can change the fact that the United States is a hacker empire,” she said.
The United States and its allies reported that these actions used a tactic known as “Live on the ground”, meaning they used tools already available online to infiltrate and mix with conventional hard-to-detect “Windows” systems, and warned that the hacking process can thus introduce legitimate commands into system administration. On the surface, this looks “correct”. Microsoft said the “Vault Typhoon” attack attempted to mix with normal network activity by routing traffic through compromised home or small office network equipment, including routers, firewalls, and virtual private network (VPN) equipment, using customized versions of open source tools.
Microsoft and security agencies have issued directives for organizations to try to detect and counter hacking activities. “This is what I would call quiet, slow cyber activity,” said Alastair McGibbon, director of strategy at Australian CyberX and former head of Australian Cyber. Security Center.
“It’s like a man in a camouflage jacket with a sniper rifle who can’t be seen, doesn’t exist,” he told AFP. time to infiltrate the system.”
He explained that once cyber-intruders get in, they can steal information, and continued, “But it also gives you the ability to perform destructive actions at a later stage.”
“very complicated”
Robert Potter, co-founder of Australian cybersecurity firm Internet 2.0, said a number of other governments have detected similar activity since the Volt warning was issued.
“I’m not sure how vulnerable the communications infrastructure will be as a result of these attacks because these networks are very resilient and difficult to take out of service for more than a short period,” Potter told AFP.
Jane Easterly, director of the U.S. Agency for Cybersecurity and Infrastructure Security, said China has been stealing intellectual property and data around the world for years.
“Today’s warning, issued in collaboration with our partners in the United States and in the international community, reflects how China is using very sophisticated means to attack our country’s critical infrastructure,” she said.