China infiltrated critical U.S. cyber infrastructure undetected for more than a year. Known targets include water utilities in Hawaii, ports on the U.S. West Coast, and oil and gas pipelines. China’s goal is to use its advantage over the United States to create chaos, create panic, and disrupt logistics.

Click to get the free Cyberguy Newsletter in your cart, including security alerts, quick video tips, tech reviews, and easy how-tos to get smarter

hacker at work (Kurt “Cyber ​​Guy” Knutson)

Scope and impact of China’s Bolt Typhoon cyber campaign

According to some information, hackers with ties to the People’s Liberation Army of China have accessed more than 20 sensitive systems. Washington Post coverage. Newly uncovered information provides a more complete understanding of the Bolt Typhoon cyber campaign, which was first identified by the U.S. government about a year ago.

You may remember that a single ransomware attack on the Colonial Pipeline caused fuel prices to skyrocket, causing lines of cars to wait hours to refuel at gas stations along the East Coast. yeah. It was the moment Americans got their first glimpse of the impact of cyberattacks and made it a central issue for the Department of Homeland Security.

Cyber ​​criminal on laptop (Kurt “Cyber ​​Guy” Knutson)

Read more: How to protect your iPhone from cyberattacks with lockdown mode

China’s escalation of cyber campaigns is a significant change

The head of the DHS Cybersecurity and Infrastructure Security Agency (CISA) said this is a significant change from Chinese cyber operations seven to 10 years ago, which focused primarily on political and economic espionage. It has been reported.

The purpose of such intimidation campaigns is to establish a pre-emptive advantageous position from which a cascade of cyberattacks can be launched to compromise American infrastructure. Attacks on many of these systems could disrupt or destroy their controls and cause chaos within the United States.

In many parts of the United States, core electric utilities are controlled by private companies. Each company operates differently. Some are more resilient than others, and many are still vulnerable to incoming stealth attacks. Chinese hacker Infiltrate the system and gain control without being detected.

One attempt to penetrate the privately operated power grid in Texas has now become known. According to the report, several power companies outside the United States were compromised.

More information: Cyberattack on D.C. election site leaves voter data exposed to hackers

Why target Hawaii?

Short answer: Taiwan. Oahu is home to the Pacific Fleet. China’s ability to disrupt U.S. military responses to potential conflicts that require the deployment of troops and equipment could undermine the timely activation of important U.S. movements.

How Chinese hackers are gaining access to critical U.S. systems

It is often caused by compromised security through the use of easily available malware or human deception. Chinese hackers were able to blend into popular network traffic and evade detection with a technique security experts call “living off the land.”

How to protect against Chinese cyberattacks

The NSA, like other government agencies, has broadly recommended mass password updates and increased monitoring of accounts with high network access privileges.

Additionally, we advocate that businesses implement more robust multi-factor authentication methods. Instead of SMS-based verification, which can be vulnerable to interception by external entities, we recommend the use of physical security keys or hardware tokens.

Cyber ​​security logo on hand (Kurt “Cyber ​​Guy” Knutson)

Read more: Inside the evil cyberring that takes over Facebook accounts

To protect each American from similar cybersecurity threats, it is important to:

1) Update and strengthen your passwords regularly, avoid common words and phrases, and use combinations of letters, numbers, and symbols. Please consider using . password manager Generate and save complex passwords.

2) Enable multi-element certification For all personal accounts, choose app-based authenticators or physical security keys when available.

3) Avoid clicking on suspicious links and stay alert for phishing attacks. or download attachments from unknown sources.

4) Keep all software up to date, including antivirus and operating system Please apply the latest security patches.see my review The best antivirus protection is here For options.

5) Be aware of the amount of personal information you share online. This is because it can be used to facilitate targeted attacks.

By taking these steps, you can build multiple layers of defense against potential cyber intrusions.

Cart important points

China’s Bolt Typhoon cyber campaign poses a serious threat to the national security and economic stability of the United States. By targeting critical infrastructure systems such as water, power, and oil, China has gained a strategic advantage over the United States and potentially disrupted its military response in the event of a conflict over Taiwan. We aim to do so.

The U.S. government and private sector must work together to strengthen cybersecurity defenses and resilience against such attacks. You and I must also take proactive steps to protect our personal data and devices from malicious hackers. Cyberwar between the United States and China is not a hypothetical scenario, but a reality that requires urgent attention and action from all of us.

What do you think about the threat of Chinese cyberattacks on U.S. critical infrastructure? Do you think the U.S. government and private sector are doing enough to protect itself and its people? Email us. Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter using the link below. Cyberguy.com/Newsletter.

Ask your cart a question or let us know your story you’d like us to feature.

Answers to CyberGuy frequently asked questions:

CyberGuy Best Holiday Gift Guide

Copyright 2023 CyberGuy.com. All rights reserved.

Share.

TOPPIKR is a global news website that covers everything from current events, politics, entertainment, culture, tech, science, and healthcare.

Leave A Reply

Exit mobile version