Global EditionASIA 中文雙語Fran?ais
    China
    Home / China / Society

    Volt Typhoon III report exposes US cyber forces operations

    By CUI JIA | chinadaily.com.cn | Updated: 2024-10-14 09:12
    Share
    Share - WeChat
    The investigative report Volt Typhoon III: A Cyber Espionage and Disinformation Campaign conducted by US Government Agencies was published on Monday. [Photo provided to chinadaily.com.cn]

    Hackers from United States cyber forces and intelligence agencies disguise themselves like "chameleons" in cyberspace by posing as other countries to conduct global cyberattacks and espionage operations, while also pouring dirty water on non-US allies like China, an investigative report published on Monday said.

    According to the report Volt Typhoon III: A Cyber Espionage and Disinformation Campaign conducted by US Government Agencies, evidence has shown that "Volt Typhoon", which US politicians, intelligence communities and companies claimed to be a China-sponsored hacking organization, had launched a series of operations targeting networks across critical US infrastructure sectors, as just one of many operations initiated by the US intelligence agency.

    The report was jointly published by the National Computer Virus Emergency Response Center and the National Engineering Laboratory for Computer Virus Prevention Technology.

    Also, according to the top-secret files of the National Security Agency, the US has for long been taking advantage of its well-developed information and communication technology industry to construct internet infrastructures to control the "Choke Points" of the internet.

    There are at least seven access sites for tapping with coverage over all submarine optical cables spanning from the Atlantic to the Pacific. All these access sites are operated by NSA, the Federal Bureau of Investigation and the National Cyber Security Centre from the United Kingdom. Each information packet intercepted through the access sites are thoroughly inspected indiscriminately, the report said.

    Furthermore, the NSA will directly use the "supply chain" attack method, which capitalizes on the advantages of the advanced US information and communication technology industry and products, against a variety of high-valued targets of other countries that have high levels of protection and are challenging to penetrate in cyberspace.

    With the cooperation of large internet enterprises or equipment suppliers in the US, NSA is able to intercept the US-made network products purchased by its targets. The products will then be unpacked and implanted with backdoor malware before repackaging and shipping to the various targets.

    The method is usually used in attack operations against other countries' telecom and network operators. When NSA gets control of the target telecom network operator's system, they will be able to monitor the target's cellphone communication content. In the attack against the Northwestern Polytechnical University, the relevant internet service provider located in China was compromised by NSA with the "supply chain" attack method. As a result, the telephone calls and internet activities of the victims were tracked by NSA in real time.

    NSA used the term "pre-position" when introducing the method in top secret documents, which specifically refers to the implant "backdoor" in IT products used by the targets, which is activated through NSA's subsequent operations. Ironically, the term "pre-position" was also used by US government agencies to describe the tactics used by so-called "Volt Typhoon" groups which carried out cyberattacks on critical US infrastructure in places like Guam. The question surrounding "pre-position" in critical infrastructure worldwide is quite clear.

    Previously on April 15 and July 8, the two institutions published two investigative reports on "Volt Typhoon", which launched a series of operations affecting networks across critical US infrastructure sectors.

    The reports stated that analysis by Chinese technical teams showed that many of the IP addresses used by "Volt Typhoon" to launch the attacks were previously used by a ransomware group named "Dark Power", which had no country and sectoral connection. And the US government agencies orchestrated and hyped up the "Volt Typhoon" cyberthreat narrative to secure additional funding from the US Congress and to bolster the cyber-infiltration capabilities of US intelligence agencies.

    The allegation originated from a joint advisory by the cybersecurity authorities of the US and its "Five Eyes" allies — the United Kingdom, Australia, Canada and New Zealand. With the advisory issued based on information released by US tech company Microsoft, which has failed to provide a detailed analytical process for source tracing of the cyberattacks from "Volt Typhoon".

    Click here to read the full text of the report

    Top
    BACK TO THE TOP
    English
    Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
    License for publishing multimedia online 0108263

    Registration Number: 130349
    FOLLOW US
     
    日韩精品久久无码中文字幕| 色吊丝中文字幕| 国产成人综合日韩精品无码不卡 | 国产色无码专区在线观看| 日韩电影无码A不卡| 99高清中文字幕在线| 少妇无码太爽了不卡在线观看| 亚洲∧v久久久无码精品| 亚洲精品无码久久不卡| 欧美日韩中文字幕久久久不卡 | 亚洲日韩激情无码一区| 国产精品无码久久综合网| 中文字幕亚洲精品| 国产精品无码av在线播放| 日韩中文字幕免费视频| 亚洲av无码不卡| 最近2019中文字幕一页二页| 精品无码国产一区二区三区51安| 日本按摩高潮a级中文片| 国产a v无码专区亚洲av| 亚洲中文字幕丝袜制服一区| 欧美日韩中文国产一区发布 | 国产 亚洲 中文在线 字幕| 久久久久亚洲av无码专区喷水| 亚洲中文字幕不卡无码| 久久无码AV中文出轨人妻| 无码欧精品亚洲日韩一区夜夜嗨 | 日日摸日日碰夜夜爽无码| 亚洲精品无码午夜福利中文字幕| 亚洲精品人成无码中文毛片| 最近免费视频中文字幕大全| 久久亚洲精品中文字幕三区| 精品人妻中文av一区二区三区 | 色综合久久精品中文字幕首页| 波多野结衣中文字幕免费视频 | 中文无码制服丝袜人妻av| 亚洲AV无码成人专区片在线观看| 少妇无码AV无码一区| 亚洲一区二区三区AV无码| 亚洲成a人片在线观看无码 | 精品无码人妻一区二区三区品 |