Americans Should Prepare for Chinese Cyberattacks Against U.S. Critical Infrastructure cyber sabotage

Jen Easterly, the Director of the Cybersecurity & Infrastructure Security Agency (CISA), declared that Americans should be prepared for Chinese cyberattacks against United States critical infrastructure, should China and the U.S. escalate into a kinetic conflict. Easterly believes cyber sabotage attempts is “a real threat we should be prepared for.”

The foreboding comments were made today at the Aspen Institute in Washington, and reported by Reuters.

Easterly commented that China has made substantial investments in disrupting critical infrastructure through cyber capabilities.

“This, I think, is the real threat that we need to be prepared for, and to focus on, and to build resilience against,” she told the audience.

Increasingly capable Chinese Communist Party (CCP) hacking operations, both military and state-sponsored, would likely be able to dodge sophisticated U.S. cyber defenses, and potentially cause damage or fully sabotage critical infrastructure.

“Given the formidable nature of the threat from Chinese state actors, given the size of their capability, given how much resources and effort they’re putting into it, it’s going to be very, very difficult for us to prevent disruptions from happening,” she said.

AI, Chinese Hacking Remain Top Concerns

This isn’t the first time that Easterly has warned the public about China’s growing cyber prowess and hacking sophistication. In February of this year, Easterly declared that the Chinese government is hacking the U.S. government “every day.”

Most recently, Easterly also declared that artificial intelligence is “the most powerful weapon of our time,” and that it may lead to cyber events targeting the 2024 U.S. Presidential Election.

No comment was provided by the Chinese government or the Chinese embassy in Washington, per Reuters.

China’s Rising Hacking Prominence: Volt Typhoon

Microsoft warns that China hackers attacked U.S. infrastructure
A CNBC report on the United States and Microsoft detecting malware on U.S. critical infrastructure in Guam. The malware was designed to disrupt any communications with Asian allies to the U.S., disrupt maritime operations and transportation, among the key the findings. (Source: CNBC)

Just last month, it was reported that malicious code (malware) was detected by U.S. federal agencies and Microsoft on network equipment and IT infrastructure in Guam. The hacking group was attributed as a Chinese state-sponsored, and named “Volt Typhoon” by Microsoft.

Volt Typhoon was seen as a stealth, staging cyber operation by China in advance of any further escalation between the U.S. and China—or any U.S. military action in defense of Taiwan that China deems excessive.

Guam is key to any future U.S. military operation or potential conflict against China or in defense of Taiwan, strategically positioned. Guam is an island and has been a U.S. territory since 1898, and is located in the North Pacific Ocean.

Ultimately, Volt Typhoon would be able to disrupt communications across the Asia-Pacific region that may support U.S. military operations, concluded Microsoft. Maritime operations, transportation, and critical infrastructure were all targets of Volt Typhoon.

The National Security Agency (NSA) and members of the “Five Eyes” intelligence council published a 24-page analysis on Volt Typhoon using Microsoft’s research. The report also includes other key findings and warnings from the group regarding China’s cyber capabilities.

It was reported in the fall of 2022 that Taiwan is also anticipating cyberattacks or a “cyber war” with China in the event of a full-scale conflict. Taiwan is increasingly investing in cybersecurity and cyber capabilities amongst its population in preparation.


Discover more from Cybersecurity Careers Blog

Subscribe to get the latest posts sent to your email.