Cyber attacks against key US infrastructure continue, but this time its China

China
Image credit: Shutterstock (Image credit: Shutterstock)

Following a suspected recent Iranian cyberattack against a US water treatment facility, government officials are now alleging that the Chinese military has been targeting a number of water and power installations across the country.

Transportation systems are among the apparent targets, with the assaults supposedly being carried out to develop a broader attack playbook that could be deployed if war were to break out between the US and China.

Crippling key infrastructure after an outbreak of hostilities would slow logistics, create potential hysteria within population centers, and ultimately destabilize the nation.

 Five Eyes on China

The attacks are being carried out by groups affiliated with the People’s Liberation Army, and the groups have infiltrated twenty to thirty sites across the country. according to unnamed officials who spoke to the Washington Post.

Among the targets were water infrastructure in Hawaii, the operator of the Texas power grid, a port on the West Coast, and at least one oil and gas pipeline. While attacks against these sites are serious, apparently no critical control systems were breached.

The group behind many of the attacks, Volt Typhoon, has links to China’s People's Liberation Army and employs a wide range of sophisticated tactics such as 'living off the land techniques', which uses built-in network administration tools to perform attacks.

The group has been referenced in a number of attack reports released by the Cybersecurity & Infrastructure Security Agency (CISA), as well as being named in warnings released by Microsoft researchers and the Five Eyes intelligence alliance.

Speaking to the Washington Post, Brandon Wales, the executive director of CISA, said, “It is very clear that Chinese attempts to compromise critical infrastructure are in part to pre-position themselves to be able to disrupt or destroy that critical infrastructure in the event of a conflict, to either prevent the United States from being able to project power into Asia or to cause societal chaos inside the United States — to affect our decision-making around a crisis.

“That is a significant change from Chinese cyber activity from seven to 10 years ago that was focused primarily on political and economic espionage.”

More from TechRadar Pro

Benedict Collins
Staff Writer (Security)

Benedict has been writing about security issues for over 7 years, first focusing on geopolitics and international relations while at the University of Buckingham. During this time he studied BA Politics with Journalism, for which he received a second-class honours (upper division), then continuing his studies at a postgraduate level, achieving a distinction in MA Security, Intelligence and Diplomacy. Upon joining TechRadar Pro as a Staff Writer, Benedict transitioned his focus towards cybersecurity, exploring state-sponsored threat actors, malware, social engineering, and national security. Benedict is also an expert on B2B security products, including firewalls, antivirus, endpoint security, and password management.

Read more
China US flags cropped
Guam's critical infrastructure is under attack - and Volt Typhoon is the top suspect
China
Microsoft says Chinese Silk Typhoon hackers are targeting cloud and IT apps to steal business data
China
Chinese hackers develop effective new hacking technique to go after business networks
An American flag flying outside the US Capitol building against a blue sky
More alleged Chinese intrusions into the US Treasury revealed
An illustration of a silhouetted thief in motion running while carrying a stolen fingerprint
The 5 worst cyberattacks of 2024
A group of 7 hackers, 6 slightly blurred in the background and one in the foreground, all wearing black with hoods pulled up over their heads. You cannot see their faces. The hacker in the foreground sits with an open laptop in front of them. The background, behind the hackers, is a Chinese flag
China government-linked hackers caught running a seriously dangerous ransomware scam
Latest in Pro
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
A young man working on laptop in office writing notes
Ending the fix/break cycle of End User Computing support
OpenAI
OpenAI wants to help your business build its next generation of AI agents
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
Nation-state threats are targeting UK AI research
A hand reaching out to touch a futuristic rendering of an AI processor.
Business investors are positive about AI’s impact on the economy
Scam alert
Fake jobs and phone calls: How Americans lost $12.5 bn to fraud in 2024
Latest in News
Vision Pro Metallica
Apple Vision Pro goes off to never never land with Metallica concert footage
Mufasa is joined by another lion, a monkey and a bird in this promotional image
Mufasa: The Lion King prowls onto Disney+ as it finally gets a streaming release date
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
An Nvidia GeForce RTX 4060 on a table with its retail packaging
Nvidia RTX 5060 GPU spotted in Acer gaming PC, suggesting rumors of imminent launch are correct – and that it’ll run with only 8GB of video RAM
Indiana Jones talking to a friend in a university setting with a jaunty smile on his face
New leak claims Indiana Jones and the Great Circle PS5 release will come in April
A close up of the limited edition vinyl turntable wrist watch from AndoAndoAndo
This limited-edition timepiece turns the iconic Technics SL-1200 turntable into a watch, and I want one