Chinese hackers have been in US infrastructure for at least five years

February 7, 2024 China-backed hacking group Volt Typhoon has been identified as having “persistent” access to various sectors of U.S. critical infrastructure for “at least five years,” marking a concerning escalation in cyber threats. Targeting essential services such as water, transportation, energy, and communications, the hackers have exploited vulnerabilities in routers, firewalls, and VPNs. Utilizing stolen administrator credentials, Volt Typhoon’s operations pose a significant risk of disruption to critical systems.

The U.S. Cybersecurity and Infrastructure Security Agency, along with the National Security Agency and the Federal Bureau of Investigation, issued an advisory highlighting the need for critical infrastructure operators to fortify their cybersecurity measures. Volt Typhoon’s tactics include “living off the land” techniques, which complicate detection efforts by using the network’s own tools and processes against it.

This advisory comes amid growing concerns that China might leverage such cyber intrusions in strategies related to geopolitical tensions, notably the situation with Taiwan. Collaborative efforts from intelligence agencies in Canada, Australia, and New Zealand have also been noted, indicating a broader concern for global critical infrastructure security.

U.S. officials are urging operators to implement security best practices, such as applying software updates, enabling multi-factor authentication, and maintaining activity logs to monitor suspicious behavior. This situation underscores the vulnerabilities in U.S. critical infrastructure and the imperative for comprehensive cybersecurity defenses.

Sources include: Axios

 

Top Stories

Related Articles

May 6, 2026 The official White House mobile app for iOS and Android is facing scrutiny after a security researcher more...

May 4, 2026 Microsoft Defender mistakenly detected legitimate DigiCert root certificates as malware, triggering widespread false-positive alerts and, in some more...

April 27, 2026 Canada Life says it has contained a cybersecurity incident involving unauthorized access to internal applications through an more...

April 17, 2026 Booking.com has confirmed a data breach exposing customer booking details and contact information, prompting warnings about a more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn