Several countries warn of possible hackers backed by China

Microsoft and several countries are warning of possible Chinese-backed hackers. File photo: Andy Wong/AP/NTB

By NTB | 25.05.2023 05:28:50

Policy:- U.S. and international data security authorities are issuing this joint statement to highlight a recently discovered cluster of activity linked to a Chinese actor, also known as Volt Typhoon, he said in a statement authorities in the United States, Australia, Canada, New Zealand and the United Kingdom.

It is further stated that the group has been successful in influencing networks in critical infrastructure sectors in the United States, and they warn that others may also be exposed to espionage or attack.

Additionally, Microsoft has also developed a statement about the hacker group, which they say is state-sponsored in China and has been active since 2021. Microsoft also writes that the group generally operates in espionage and information gathering.

It’s unclear how many organizations were affected, but the US intelligence organization NSA says it is working both with its partners in other countries and with the FBI’s federal police to find possible breaches. data.

Microsoft analysts say they believe the group could disrupt communications infrastructure between the United States and countries in Asia in future crises.

The espionage now being warned against has also targeted the US island territory of Guam, where several strategically important US military bases are located.

Guam is also a major communications hub connecting Asia and Australia to the United States via several undersea cables.

Although China and the United States regularly spy on each other, analysts say this is one of the most widespread cases of computer espionage against American critical infrastructure, writes the Reuters news agency.

Instead of using standard hacking techniques, which often involve tricking a victim into downloading malicious files, Microsoft says Volt Typhoon infects the victim’s existing systems to find information and extract data.

(© NTB)