Info@NationalCyberSecurity
Info@NationalCyberSecurity

FBI ‘warns’ Americans: Chinese hackers are waiting for “just the right moment to …” | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


FBI Director Christopher Wray on April 18 warned national security and intelligence experts, as well as students, that risks the government of China poses to U.S. national and economic security are “upon us now”—and that US critical infrastructure is a prime target.

The FBI Director, Christopher Wray, has warned that Chinese government-linked hackers have infiltrated critical US infrastructure. He said this hacking group, known as Volt Typhoon, has compromised companies in vital sectors like telecommunications, energy, and water. This includes access to 23 pipeline operators. In a strong warning, Wray said that Chinese government-linked hackers are waiting “for just the right moment to deal a devastating blow,”

Chinese hackers can “wreak havoc” on US infrastructure
Wray spoke at the 2024 Vanderbilt Summit on Modern Conflict and Emerging Threats. He expressed concern that these hackers might be strategically positioned to “wreak havoc” on US infrastructure at a chosen moment. He suggested a potential motive could be to disrupt civilian services and create panic, possibly as part of a broader strategy to deter US involvement in Taiwan.

China claims Taiwan as its own territory and has threatened military action to take control. Taiwan rejects China’s claims and insists on self-determination.

China denies involvement with Volt Typhoon. A spokesperson for the Chinese Ministry of Foreign Affairs claims the group is a criminal organization, not a state-sponsored actor. The Chinese Embassy in Washington echoed this statement, accusing the U.S. of politicizing cybersecurity issues.

While China denies responsibility, private cybersecurity firms, including researchers from Microsoft and Google, have previously linked Volt Typhoon to China. The FBI says the hackers use a network of compromised computers worldwide, known as botnets, to hide their activities.

——————————————————–


Click Here For The Original Story From This Source.

.........................

National Cyber Security

FREE
VIEW