Chinese hackers targeted U.S. infrastructure, security agencies warn - Action News
Home WebMail Friday, November 22, 2024, 05:28 AM | Calgary | -13.4°C | Regions Advertise Login | Our platform is in maintenance mode. Some URLs may not be available. |
Politics

Chinese hackers targeted U.S. infrastructure, security agencies warn

The Canadian Centre for Cyber Security is warning of evidence that Chinese hackers have been targeting critical infrastructure networks in the U.S.

Canadian Centre for Cyber Security was one of several international agencies to issue an alert

The American and Chinese flags wave side by side.
The U.S. National Security Agency says it has identified 'indicators of compromise' linked to a state-sponsored cyber actor from China. (Kiichiro Sato/The Associated Press)

State-sponsored hackers from China have been targeting U.S. critical infrastructure, cybersecurity officials from around the world including Canada warned Wednesday in a co-ordinated effort to root out the perpetrators.

The Canadian Centre for Cyber Security was one of several international agencies, all of them part of the Five Eyes intelligence alliance, that took part in amplifying the alert issued by the U.S. National Security Agency.

The discovery of what the NSA described as "indicators of compromise" was first made by Microsoft and attributed to Volt Typhoon, a Chinese state actor that the company said has been active since mid-2021.

Volt Typhoon "typically focuses on espionage and information gathering," the software giant warned in its own threat assessment.

"Microsoft assesses with moderate confidence that this Volt Typhoon campaign is pursuing development of capabilities that could disrupt critical communications infrastructure between the United States and Asia region during future crises."

Rob Joyce, the director of cybersecurity for the NSA, described the style of attack as "living off the land" using existing network tools and valid credentials to better avoid detection.

"A (People's Republic of China) state-sponsored actor is living off the land, using built-in network tools to evade our defences and leaving no trace behind," Joyce said in a statement.

"That makes it imperative for us to work together to find and remove the actor from our critical networks."

The Microsoft report saysthe interloper is focused on stealthin order to maintain access to the target network which is why it relies on existing administrative tools and "hands-on-keyboard" activity to avoid detection.

"In addition, Volt Typhoon tries to blend into normal network activity by routing traffic through compromised small office and home office network equipment, including routers, firewalls and VPN hardware," said the company.

Microsoft said Volt Typhoon has already targeted infrastructure facilities around the U.S., including in Guam, where the U.S. maintains an air force base and naval port, both of which are central elements of its military presence in the Pacific Ocean.

Pentagon officials also believe Guam and its military installations were among the principal targets of the Chinese spy balloon that was shot down in February after a week of drifting through North American airspace.

An object, suspected to be a spy balloon, is seen in the sky.
The suspected Chinese spy balloon drifts to the ocean after being shot down off the coast in Surfside Beach, South Carolina, U.S. on February 4, 2023. (Randall Hill/Reuters)

Canadian officials say there have been no reports of any systems inside Canada being targeted.

"The Canadian Centre for Cyber Security joins its international partners in sharing this newly identified threat and accompanying mitigation measures with critical infrastructure sectors," agency head Sami Khoury said in a statement.

"The interconnected nature of our infrastructures and economies highlights the importance of working together with our allies to identify and share real-time threat information."

Other agencies taking part in Wednesday's announcement included the U.S. Cybersecurity and Infrastructure Security Agency, the FBI and cybersecurity agencies in Australia, New Zealand and the U.K.

"For years, China has conducted operations worldwide to steal intellectual property and sensitive data from critical infrastructure organizations around the globe," said CISA director Jen Easterly.

"(Wednesday's) advisory, put out in conjunction with our U.S. and international partners, reflects how China is using highly sophisticated means to target our nation's critical infrastructure."