Chinese state-sponsored hackers have been exploiting vulnerabilities since 2020


US government agencies share insights into Chinese hacking activities and exploitation methods to warn people

China has gotten bold, redoubling its hacking activity to steal property and compromise networks

Chinese state-sponsored hackers have gotten bold and are actively using known vulnerabilities to gain access to sensitive networks. In a recent report, the Dynamic National Security Agency reports that these attackers pose a major threat to critical infrastructure and election security.[1] CISA, the FBI, and the NSA revealed the top vulnerabilities that are mainly exploited by hackers backed by the Chinese government. These PRC hackers target government and critical infrastructure networks.[2]

Agencies report in the Joined Advisory[3] China-sponsored hackers targeting the US and other tech company networks. These threat actors rely on gaining access to related networks so that sensitive data and intellectual property can be stolen.

The NSA, CISA, and FBI continue to rate PRC state-sponsored cyber activities as one of the top and most dynamic threats to US government and civilian networks.

The recommendation is lifted to inform the people and federal, state, local, tribal and territorial governments, critical infrastructure and private sectors of specific trends and ongoing tactics, methods and procedures of these hackers. This is especially important when the US elections are coming up.[4]

Listed vulnerabilities, detection methods, vulnerable technologies

The advisor reports possible mitigations for each of the vulnerabilities most commonly exploited by Chinese threat actors. Detection methods and vulnerable technologies are also listed to help personal defenders detect and block attack attempts before the incident.

These vulnerabilities have been exploited by certain China-backed state hackers since 2020. The list includes the great Apache Log4j[5] and Microsoft vulnerabilities that have wreaked havoc since they were discovered and began to be exploited by various hacker groups.

Certain Chinese hackers have become a group that is stepping up its activities of stealing intellectual property and compromising sensitive networks. Criminals create persistence and move laterally across the interconnected networks, allowing state-sponsored actors to wreak havoc on critical infrastructure, voting systems, national security systems, and the US Department of Defense.

Dangers of cyberattacks by state-sponsored gangs

The specific mitigation measures include recommendations to governments, critical infrastructure and private sector organizations to apply the measures to defend against China-sponsored cyberattacks. Businesses can apply security patches and use phishing-resistant multi-factor authentication when possible. Replacing obsolete network infrastructure can also be helpful.

Authorities say it’s not easy to compromise voting infrastructure. Various state-backed actors from Russia, China and other countries with an interest in US elections can still try to breach the security of systems. The FBI and other leads are trying to calm the panic and concerns surrounding the 2022 midterm elections. Maliciosu hackers target electoral infrastructure during large-scale disruptions or try to prevent people from voting.

CISA reports that they have encountered no reports of these attempts to prevent people from registering to vote or to compromise the integrity of ballots or ballots, thereby avoiding the accuracy of voter registration information. These attempts can be localized, but authorities can successfully block and defuse incidents with minimal or no disruption to the electoral process.

These campaigns can be widespread and dangerous, so all security measures that can be implemented should be considered. Whether these hackers are state-sponsored Chinese groups or local criminals looking to sway election results to their side. Overall security measures are also important for everyday users, not only for government and companies or organizations.


About Author

Comments are closed.