US says it broke up China-backed infrastructure hacking op | National | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker

[ad_1]

US authorities said Wednesday they had dismantled a network of hackers known as Volt Typhoon, which was targeting key American public sector infrastructure like water treatment plants and transportation systems at the behest of China.

FBI Director Christopher Wray explained the operation in testimony before a congressional committee on US-China competition, and the Justice Department offered more details in a statement.


This page requires Javascript.

Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

kAmx? |2J a_ab[ E96 &?:E65 $E2E6D 2?5 :ED 2==:6D 925 244FD65 ‘@=E %JA9@@?[ 56D4C:365 2D 2 QDE2E6DA@?D@C65 924<:?8 8C@FAQ 324<65 3J r9:?2[ @7 :?7:=EC2E:?8 4C:E:42= &$ :?7C2DECF4EFC6 ?6EH@C<D \ 4=2:>D C6;64E65 3J q6:;:?8]k^Am

kAmQyFDE E9:D >@C?:?8[ H6 2??@F?465 2? @A6C2E:@? H96C6 H6 2?5 @FC A2CE?6CD :56?E:7:65 9F?5C65D @7 C@FE6CD E92E 925 366? E2<6? @G6C 3J E96 !#r DE2E6DA@?D@C65 924<:?8 8C@FA <?@H? 2D ‘@=E %JA9@@?[Q (C2J E@=5 =2H>2<6CD[ C676CC:?8 E@ r9:?2 3J :ED @77:4:2= 24C@?J>]k^Am

kAmQ%96 ‘@=E %JA9@@? >2=H2C6 6?23=65 r9:?2 E@ 9:56[ 2>@?8 @E96C E9:?8D[ AC6@A6C2E:@?2= C64@??2:DD2?46 2?5 ?6EH@C< 6IA=@:E2E:@? 282:?DE 4C:E:42= :?7C2DECF4EFC6 =:<6 @FC 4@>>F?:42E:@?D[ 6?6C8J[ EC2?DA@CE2E:@? 2?5 H2E6C D64E@CD]Qk^Am

kAm(C2J 244FD65 E96 924<6CD @7 C625J:?8 E@ QHC62< 92G@4 2?5 42FD6 C62=H@C=5 92C> E@ p>6C:42? 4:E:K6?D 2?5 4@>>F?:E:6D]Qk^Am

kAmQx7 2?5 H96? r9:?2 564:56D E96 E:>6 92D 4@>6 E@ DEC:<6[ E96JVC6 ?@E 7@4FD65 ;FDE @? A@=:E:42= @C >:=:E2CJ E2C86ED[Q 96 25565] Q{@H 3=@HD 282:?DE 4:G:=:2?D 2C6 A2CE @7 r9:?2VD A=2?]Qk^Am

kAmpDD:DE2?E pEE@C?6J v6?6C2= |2EE96H ~=D6?[ H9@ H@C<D 😕 E96 yFDE:46 s6A2CE>6?EVD ?2E:@?2= D64FC:EJ 5:G:D:@?[ D2:5 2446DD E@ &$ :?7C2DECF4EFC6 D@F89E 3J ‘@=E %JA9@@? H2D D@>6E9:?8 r9:?2 QH@F=5 36 23=6 E@ =6G6C286 5FC:?8 2 7FEFC6 4C:D:D]Qk^Am

kAm%96 &$ @A6C2E:@? E@ 5:DCFAE E96 924<6CD H2D 2FE9@C:K65 3J 2 7656C2= 4@FCE 😕 %6I2D[ E96 yFDE:46 s6A2CE>6?E D2:5 😕 :ED DE2E6>6?E]k^Am

kAmqJ E2<:?8 4@?EC@= @7 9F?5C65D @7 C@FE6CD[ H9:49 H6C6 GF=?6C23=6 2D E96J H6C6 ?@ =@?86C DFAA@CE65 3J E96:C >2<6CVD D64FC:EJ A2E496D @C D@7EH2C6 FA52E6D[ E96 924<6CD D@F89E E@ 5:D8F:D6 E96 @C:8:? @7 7FEFC6 r9:?232D65 924<:?8 24E:G:E:6D[ :E D2:5]k^Am

kAm%96 @A6C2E:@? DF4466565 😕 H:A:?8 E96 >2=H2C6 7C@> E96 C@FE6CD[ H:E9@FE :>A24E:?8 E96:C =68:E:>2E6 7F?4E:@?D @C 4@==64E:?8 2?J :?7@C>2E:@?[ :E 25565[ H9:=6 D2J:?8 E96C6 H2D ?@ 8F2C2?E66 E96 C@FE6CD 4@F=5 ?@E 36 C6:?764E65]k^Am

kAmpD<65 23@FE E96 2==682E:@?D @? %9FCD52J[ q6:;:?8 D2:5 E96 &$ 925 Q>256 8C@F?5=6DD 244FD2E:@?D 2?5 D>62C65 r9:?2 H:E9@FE 2?J 6G:56?46Q]k^Am

kAmQ%9:D 😀 6IEC6>6=J :CC6DA@?D:3=6 2?5 AFC6=J 4@?7FD6D C:89E 2?5 HC@?8[Q 7@C6:8? >:?:DECJ DA@<6DA6CD@? (2?8 (6?3:? D2:5]k^Am

kAmQ%96 &$ 😀 E96 @C:8:? @7 2?5 E96 6IA6CE @? 4J36C 2EE24<D[Q 96 E@=5 2 C68F=2C AC6DD 3C:67:?8]k^Am

kAmDDE@9@^D?k^Am

(function(d, s, id) {
var js, fjs = d.getElementsByTagName(s)[0];
if (d.getElementById(id)) return;
js = d.createElement(s); js.id = id;
js.src = “//connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.5&appId=231833083532362”;
fjs.parentNode.insertBefore(js, fjs);
}(document, ‘script’, ‘facebook-jssdk’));

[ad_2]

——————————————————–


Click Here For The Original Story From This Source.

National Cyber Security

FREE
VIEW