Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

BREAKING: China Hacks Critical U.S. Infrastructure, Microsoft Says
Breaking 911 ^ | May 24, 2023

Posted on 05/24/2023 1:17:52 PM PDT by McGruff

Microsoft has uncovered stealthy and targeted malicious activity focused on post-compromise credential access and network system discovery aimed at critical infrastructure organizations in the United States. The attack is carried out by Volt Typhoon, a state-sponsored actor based in China that typically focuses on espionage and information gathering. Microsoft assesses with moderate confidence that this Volt Typhoon campaign is pursuing development of capabilities that could disrupt critical communications infrastructure between the United States and Asia region during future crises.

Volt Typhoon has been active since mid-2021 and has targeted critical infrastructure organizations in Guam and elsewhere in the United States. In this campaign, the affected organizations span the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors. Observed behavior suggests that the threat actor intends to perform espionage and maintain access without being detected for as long as possible.

(Excerpt) Read more at breaking911.com ...


TOPICS: Breaking News; China; Foreign Affairs; Government; News/Current Events; War
KEYWORDS: 2021; 202305; chicoms; china; communications; guam; hacking; infiltration; livefreeordiehard; nationalsecurity; pacific; spying; volttyphoon
Navigation: use the links below to view more comments.
first previous 1-2021-4041-56 next last
To: McGruff

Alas, security that depends on the expertise, diligence and loyalty of humans is bound to fail.

>>Volt Typhoon achieves initial access to targeted organizations through internet-facing Fortinet FortiGuard devices. Microsoft continues to investigate Volt Typhoon’s methods for gaining access to these devices.

>>The threat actor attempts to leverage any privileges afforded by the Fortinet device, extracts credentials to an Active Directory account used by the device, and then attempts to authenticate to other devices on the network with those credentials.

>>Volt Typhoon proxies all its network traffic to its targets through compromised SOHO network edge devices (including routers). Microsoft has confirmed that many of the devices, which include those manufactured by ASUS, Cisco, D-Link, NETGEAR, and Zyxel, allow the owner to expose HTTP or SSH management interfaces to the internet. Owners of network edge devices should ensure that management interfaces are not exposed to the public internet in order to reduce their attack surface. By proxying through these devices, Volt Typhoon enhances the stealth of their operations and lowers overhead costs for acquiring infrastructure.


21 posted on 05/24/2023 1:54:26 PM PDT by FarCenter
[ Post Reply | Private Reply | To 1 | View Replies]

To: McGruff

This will be a never-ending struggle for us as well as them. For everyone.

I’m glad they caught this, but rest assured there is a lot more out there, every day, every hour, every minute.

And we are spying on them, and are trying to infiltrate, skew, mess up and dominate in cyberspace, just like everywhere else, as is everyone else.

And I even think it is justified, as they think the same.

Every system connected is a potential access point for all of this. However, the good and profit we get from these connected systems also has its weakness.

Be ever vigilant.


22 posted on 05/24/2023 1:56:39 PM PDT by Alas Babylon! (Gov't declaring misinformation is tyranny: “Who determines what false information is?” )
[ Post Reply | Private Reply | To 1 | View Replies]

To: McGruff

It isn’t espionage if the President of the USA works for you and is paid handsomely for the information


23 posted on 05/24/2023 2:02:27 PM PDT by eyeamok
[ Post Reply | Private Reply | To 1 | View Replies]

To: McGruff

.


24 posted on 05/24/2023 2:04:04 PM PDT by sauropod (“If they don’t believe our lies, well, that’s just conspiracy theorist stuff, there.”)
[ Post Reply | Private Reply | To 1 | View Replies]

To: buwaya

China is not a COMPETITOR; they are the ENEMY.


25 posted on 05/24/2023 2:13:21 PM PDT by Carriage Hill (A society grows great when old men plant trees, in whose shade they know they will never sit.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: McGruff

They are getting ready for the invasion of Taiwan.


26 posted on 05/24/2023 2:15:45 PM PDT by NeverTyranny
[ Post Reply | Private Reply | To 1 | View Replies]

To: McGruff

But keep using TikTok, morons.


27 posted on 05/24/2023 2:17:13 PM PDT by windsorknot
[ Post Reply | Private Reply | To 1 | View Replies]

To: Carriage Hill

Maybe they can improve Windows 11...


28 posted on 05/24/2023 2:21:28 PM PDT by refermech
[ Post Reply | Private Reply | To 25 | View Replies]

To: McGruff
Chinese doctrine is to steal any and all technology and information they can from anyone they can. Communism doesn’t recognize private property or intellectual property rights, in their minds there’s nothing wrong with it.

There are tens of thousands of Chinese students at American Universities. Pretty much all are spying for the CCP in some capacity.

29 posted on 05/24/2023 2:21:46 PM PDT by GaryCrow
[ Post Reply | Private Reply | To 1 | View Replies]

To: FarCenter

Which begs the question, how much of the COVID fraud $$ went to ChyNa? Unemployment Insurance, Payroll Protection, Shared Work et al? Asking for the Taxpayers.


30 posted on 05/24/2023 2:30:06 PM PDT by Shady (The Force of Liberty must prevail for the sake of our Children and Grandchildren...)
[ Post Reply | Private Reply | To 21 | View Replies]

To: Red Badger

They are just being competitive. C’mon man.


31 posted on 05/24/2023 2:38:17 PM PDT by unixfox (Abolish Slavery, Repeal the 16th Amendment)
[ Post Reply | Private Reply | To 6 | View Replies]

To: McGruff

Related to the balloon flyover that Biden just brushes off.

Don’t we have nuclear “deterrent “ on Guam?


32 posted on 05/24/2023 2:53:07 PM PDT by eartick (Stupidity is expecting the government that broke itself to go out and fix itself. Texan for TEXIT)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alas Babylon!
...ever vigilant.

Ironically, that was the slogan of my old unit, ASA--the US Army Security Agency--which was disbanded by the "geniuses" in the Pentagon.

33 posted on 05/24/2023 3:15:07 PM PDT by CDB
[ Post Reply | Private Reply | To 22 | View Replies]

To: EBH

Maybe for theory Taiwan attack


34 posted on 05/24/2023 3:15:43 PM PDT by pangaea6
[ Post Reply | Private Reply | To 4 | View Replies]

To: McGruff

I expect to hear more and more egregious acts about China. They need us primed and accepting of their moves towards China. I hardly expect this administration to go to congress for ‘permission’ tho.


35 posted on 05/24/2023 3:21:20 PM PDT by HollyB
[ Post Reply | Private Reply | To 1 | View Replies]

To: McGruff

If I have this [marginally / mostly] right, in my own manner of trying to make the info simple . . .

Because some computer users choose weak passwords (and weak username and password combinations), and because network protection is weak for some networks that do not take precautions that would block external attacks . . .

A malicious hacker can take advantage of the weaknesses and succeed at gathering from a relatively exposed Windows OS computer, the username and password combination (credentials) of an account for, and access to, an Internet server of interest.

Then, the hacker proceeds to:

- collect other credentials (including digital certificates and cookies)

- collect the hash data for username and password combinations

- plant a (domain control media) script by which to assist with future access

Later and off-site, the hacker, with software that uses the stolen hash data and other credentials . . . is able to determine at least some additional username and password combinations.

The details:

https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/

Suggestions:

Choose strong passwords. Bare minimum of 14 characters, but longer are much preferred.

Use a unique password for each account.

Use a unique username for each account.

If the account requires an e-mail address for the username, then create a unique alias e-mail address (see instructions at your e-mail host).

Require a strong username and strong password for administrative access to any network router, modem, DNS server, and DHCP server.


36 posted on 05/24/2023 4:06:01 PM PDT by linMcHlp
[ Post Reply | Private Reply | To 1 | View Replies]

To: linMcHlp

And, require a strong username and strong password for administrative access to any network switch.


37 posted on 05/24/2023 4:09:29 PM PDT by linMcHlp
[ Post Reply | Private Reply | To 36 | View Replies]

To: McGruff

They own the president. Why bother hacking anything?


38 posted on 05/24/2023 4:19:19 PM PDT by Organic Panic (Democrats. Memories as short as Joe Biden's eyes)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

All right, calm down people. I have it on good authority (Pres. Biden) that the Chinese are good people and the real threat is White Supremacists.


39 posted on 05/24/2023 5:09:50 PM PDT by BipolarBob (I was going to start procrastinating this year, I just haven't got around to it.)
[ Post Reply | Private Reply | To 38 | View Replies]

I dig how no one noticed that VT has been in the wild for 2 years and no one questioned the likelihood that the zero-day crews reverse-engineered a response on the upload back to PLA servers that gave us access to Xi's douchebaggery.

Yeah, I dig it. You all go on with your small talk.

40 posted on 05/24/2023 5:17:05 PM PDT by StAnDeliver (Tanned, rested, and ready.)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-56 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson