{"id":6538,"date":"2023-05-25T16:14:53","date_gmt":"2023-05-25T16:14:53","guid":{"rendered":"https:\/\/ameforum.net\/?p=6538"},"modified":"2023-05-25T16:15:24","modified_gmt":"2023-05-25T16:15:24","slug":"chinese-malware-hits-systems-on-guam-is-taiwan-the-real-target","status":"publish","type":"post","link":"https:\/\/ameforum.net\/ar\/chinese-malware-hits-systems-on-guam-is-taiwan-the-real-target\/","title":{"rendered":"Chinese Malware Hits Systems on Guam. Is Taiwan the Real Target?"},"content":{"rendered":"\n<p>David E. Sanger<br><\/p>\n\n\n\n<p>Around the time that the F.B.I. was examining the equipment recovered from the Chinese spy balloon shot down off the South Carolina coast in February, American intelligence agencies and Microsoft detected what they feared was&nbsp;a more worrisome intruder: mysterious computer code appearing in telecommunications systems in Guam and elsewhere in the United States.<\/p>\n\n\n\n<p>The code, which Microsoft said was installed by a Chinese government hacking group, raised alarms because Guam, with its Pacific ports and vast American air base, would be a centerpiece of any American military response to an invasion or blockade of Taiwan. The operation was conducted with great stealth, sometimes flowing through home routers and other common internet-connected consumer devices, to make the intrusion harder to track.<\/p>\n\n\n\n<p>The code is called a \u201cweb shell,\u201d in this case a malicious script that enables remote access to a server. Home routers are particularly vulnerable, especially older models that have not had updated software and protections.<\/p>\n\n\n\n<p>Unlike the\u00a0<a href=\"https:\/\/www.nytimes.com\/2023\/02\/15\/us\/politics\/balloon-ufo-us-china.html\" target=\"_blank\" rel=\"noopener\">balloon that fascinated Americans<\/a>\u00a0as it performed pirouettes over sensitive nuclear sites, the computer code could not be shot down on live television. So instead, Microsoft on Wednesday\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/24\/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques\/\" target=\"_blank\" rel=\"noreferrer noopener\">published details of the code<\/a>\u00a0that would make it possible for corporate users, manufacturers and others to\u00a0detect and remove it. In a coordinated release, the National Security Agency \u2014 along with other domestic agencies and counterparts in Australia, Britain, New Zealand and Canada \u2014\u00a0<a href=\"https:\/\/media.defense.gov\/2023\/May\/24\/2003229517\/-1\/-1\/0\/CSA_Living_off_the_Land.PDF\" target=\"_blank\" rel=\"noreferrer noopener\">published a 24-page advisory<\/a>\u00a0that referred to Microsoft\u2019s finding and offered broader warnings about a \u201crecently discovered cluster of activity\u201d from China.<\/p>\n\n\n\n<p>Microsoft called the hacking&nbsp;group \u201cVolt Typhoon\u201d and said that it was part of a state-sponsored Chinese effort aimed at not only&nbsp;critical infrastructure such as&nbsp;communications, electric and gas utilities, but&nbsp;also&nbsp;maritime operations and transportation. The intrusions appeared, for now, to be an espionage campaign. But the Chinese&nbsp;could use the code, which is designed to pierce firewalls, to enable destructive attacks, if they choose.<\/p>\n\n\n\n<p>So far, Microsoft says, there is no evidence that the Chinese group has used the access for any offensive attacks. Unlike Russian groups, the Chinese intelligence and military hackers usually prioritize espionage.<\/p>\n\n\n\n<p>In interviews, administration officials said they believed the code was part of a vast Chinese intelligence collection effort that spans cyberspace, outer space and, as Americans discovered with the balloon incident, the lower atmosphere.<\/p>\n\n\n\n<p>The Biden administration has declined to discuss what the F.B.I. found as it examined the equipment recovered from the balloon. But the craft \u2014 better described as a huge aerial vehicle \u2014 apparently included specialized radars and communications interception devices that the F.B.I. has been examining since the balloon was shot down.<\/p>\n\n\n\n<p>It is unclear whether the government\u2019s silence about its finding from the balloon is motivated by a desire to keep the Chinese government from knowing what the United States has learned or to get past the diplomatic breach that followed the incursion.<\/p>\n\n\n\n<p>On Sunday, speaking at a news conference in Hiroshima, Japan, President Biden referred to how the balloon incident had paralyzed the already frosty exchanges between Washington and Beijing.<\/p>\n\n\n\n<p>\u201cAnd then this silly balloon that was carrying two freight cars\u2019 worth of spying equipment was flying over the United States,\u201d he told reporters, \u201cand it got shot down, and everything changed in terms of talking to one another.\u201d<\/p>\n\n\n\n<p>He predicted that relations would \u201cbegin to thaw very shortly.\u201d<\/p>\n\n\n\n<p>China has never acknowledged hacking into American networks, even in the biggest example of all: the theft of security clearance files of roughly 22 million Americans \u2014 including six million sets of fingerprints \u2014 from the Office of Personnel Management during the Obama administration. That exfiltration of data took the better part of a year, and resulted in an agreement between President Barack Obama and President Xi Jinping that resulted in a brief decline in malicious Chinese cyberactivity.<\/p>\n\n\n\n<p>On Wednesday, China sent a warning to its companies to be alert to American hacking. And there has been plenty of that, too: In documents released by Edward Snowden, the former N.S.A. contractor, there was evidence of American efforts to hack into the systems of Huawei, the Chinese telecommunications giant, and military and leadership targets.<\/p>\n\n\n\n<p>Telecommunications networks are key targets for hackers, and the system in Guam is particularly important to China because military communications often piggyback on commercial networks.<\/p>\n\n\n\n<p>Tom Burt, the executive&nbsp;who oversees Microsoft\u2019s threat intelligence unit, said in an interview that the company\u2019s analysts \u2014 many of them veterans of the National Security Agency and other intelligence agencies \u2014 had&nbsp;found the code \u201cwhile investigating intrusion activity impacting a U.S. port.\u201d As they traced back the intrusion, they found other networks that were hit, \u201cincluding some in the telecommunications sector in Guam.\u201d<\/p>\n\n\n\n<p>Anne Neuberger, the deputy national security adviser for cyber and emerging technology, said that covert efforts \u201clike the activity exposed today are part of what\u2019s driving our focus on the security of telecom networks and the urgency to use trusted vendors\u201d whose equipment has met established cybersecurity standards.<\/p>\n\n\n\n<p>Ms. Neuberger has been spearheading an effort across the federal government to enforce new cybersecurity standards for critical infrastructure. Officials were taken by surprise by the extent of the vulnerabilities in such infrastructure when a&nbsp;<a href=\"https:\/\/www.nytimes.com\/2021\/05\/08\/us\/politics\/cyberattack-colonial-pipeline.html\" target=\"_blank\" rel=\"noopener\">Russian ransomware attack on Colonial Pipeline<\/a>&nbsp;in 2021 interrupted gasoline, diesel and airplane fuel flow on the East Coast. In the wake of the attack, the Biden administration used little-known powers of the Transportation Security Administration \u2014 which regulates pipelines \u2014 to force private-sector utilities to follow a series of cybersecurity mandates.<\/p>\n\n\n\n<p>Now Ms. Neuberger is driving what she called a \u201crelentless focus on improving the cybersecurity of our pipelines, rail systems, water systems and other critical services,\u201d including the mandates on cybersecurity practices for these sectors and closer collaboration with companies with \u201cunique visibility\u201d into threats to such infrastructure.<\/p>\n\n\n\n<p>Those firms include Microsoft, Google, Amazon, and many telecommunications firms that can see activity on domestic networks. Intelligence agencies, including the N.S.A., are forbidden by law from operating inside the United States. But the N.S.A. is permitted to publish warnings, as it did on Wednesday, alongside the F.B.I. and the Department of Homeland Security\u2019s Cyber Infrastructure and Security Administration.<br><\/p>\n\n\n\n<p>The agency\u2019s report is part of a relatively new U.S. government move to publish such data quickly in hopes of burning operations like the one mounted by the Chinese government. In years past, the United States usually withheld such information \u2014 sometimes classifying it \u2014 and shared it with only&nbsp;a select few companies or organizations. But that almost always assured that the hackers could stay well ahead of the government.<\/p>\n\n\n\n<p>In this case, it was the focus on Guam that particularly seized the attention of officials who are assessing China\u2019s capabilities \u2014 and its willingness \u2014 to attack or choke off Taiwan. Mr. Xi has ordered the People\u2019s Liberation Army to be capable of taking the island by 2027. But the C.I.A. director, William J. Burns, has noted to Congress that the order \u201cdoes not mean he has decided to conduct an invasion.\u201d<\/p>\n\n\n\n<p>In the dozens of U.S. tabletop exercises conducted in recent years to map out what such an attack might look like, one of China\u2019s first anticipated moves would be to cut off American communications and slow the United States\u2019 ability to respond. So the exercises envision attacks on satellite and ground communications, especially around American installations where military assets would be mobilized.<\/p>\n\n\n\n<p>None is bigger than Guam, where Andersen Air Force Base would be the launching point for many of the Air Force missions to help defend the island, and a Navy port is crucial for American submarines.<br><br>(Source: The New York Times)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>David E. Sanger Around the time that the F.B.I. was examining the equipment recovered from the Chinese spy balloon shot down off the South Carolina coast in February, American intelligence agencies and Microsoft detected what they feared was&nbsp;a more worrisome intruder: mysterious computer code appearing in telecommunications systems in Guam and elsewhere in the United &hellip;<\/p>\n","protected":false},"author":11,"featured_media":6539,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[183,218,172],"tags":[],"class_list":["post-6538","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-asian-issues","category-reports-and-articles","category-172"],"_links":{"self":[{"href":"https:\/\/ameforum.net\/ar\/wp-json\/wp\/v2\/posts\/6538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ameforum.net\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ameforum.net\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ameforum.net\/ar\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/ameforum.net\/ar\/wp-json\/wp\/v2\/comments?post=6538"}],"version-history":[{"count":1,"href":"https:\/\/ameforum.net\/ar\/wp-json\/wp\/v2\/posts\/6538\/revisions"}],"predecessor-version":[{"id":6541,"href":"https:\/\/ameforum.net\/ar\/wp-json\/wp\/v2\/posts\/6538\/revisions\/6541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ameforum.net\/ar\/wp-json\/wp\/v2\/media\/6539"}],"wp:attachment":[{"href":"https:\/\/ameforum.net\/ar\/wp-json\/wp\/v2\/media?parent=6538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ameforum.net\/ar\/wp-json\/wp\/v2\/categories?post=6538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ameforum.net\/ar\/wp-json\/wp\/v2\/tags?post=6538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}