Close Menu
West TimelinesWest Timelines
  • News
  • Politics
  • World
    • Africa
    • Asia
    • Australia
    • Europe
      • United Kingdom
      • Germany
      • France
      • Italy
      • Russia
      • Spain
      • Turkey
      • Ukraine
    • North America
      • United States
      • Canada
    • South America
  • Business
    • Finance
    • Markets
    • Investing
    • Small Business
    • Crypto
  • Elections
  • Entertainment
  • Health
  • Lifestyle
    • Fashion
    • Food & Drink
    • Travel
    • Astrology
  • Weird News
  • Science
  • Sports
    • Soccer
  • Technology
  • Viral Trends
Trending Now

Dubai Spotlight: Analyzing the Evolving Audience Tastes with AI Social Listening Tools in the UAE

4 weeks ago

مرآة التاريخ: تحليل البناء السردي للدروس الخالدة في قصص الأنبياء والإسلام

4 weeks ago

السندات الحكومية والشركات: أساسيات الاستثمار الآمن والدخل الثابت

1 month ago

UAE Ranks Among Top Rugby Markets on TOD as British & Irish Lions Tour Kicks Off

5 months ago

Darven: A New Leap in AI-Powered Legal Technology Launching from the UAE to the World

6 months ago
Facebook X (Twitter) Instagram
West TimelinesWest Timelines
  • News
  • US
  • #Elections
  • World
    • North America
      • United States
      • Canada
    • Europe
      • United Kingdom
      • Germany
      • France
      • Italy
      • Spain
      • Ukraine
      • Russia
      • Turkey
    • Asia
    • Australia
    • Africa
    • South America
  • Politics
  • Business
    • Finance
    • Investing
    • Markets
    • Small Business
    • Crypto
  • Lifestyle
    • Astrology
    • Fashion
    • Food & Drink
    • Travel
  • Health
  • Sports
    • Soccer
  • More
    • Entertainment
    • Technology
    • Science
    • Viral Trends
    • Weird News
Subscribe
  • Israel War
  • Ukraine War
  • United Kingdom
  • Canada
  • Germany
  • France
  • Italy
  • Russia
  • Spain
  • Turkey
  • Ukraine
West TimelinesWest Timelines
Home»News
News

The Chinese Cyber Threat: How China is Targeting America with Hacking

April 11, 2024No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Telegram Email WhatsApp Copy Link

China’s latest hacking attempt in the form of the Volt Typhoon system has shocked the cybersecurity industry due to its massive scale. Designed to cripple U.S. computer systems in the event of war between America and China, the system has already been used in attempted hacking on emergency services, military installations, and satellites. The system is seen as a significant threat by experts such as FBI Director Christopher Wray, who referred to it as “the defining threat of our generation.” The campaign by Chinese state agents aims to gain access to industrial control systems and critical infrastructure globally, not just in the U.S.

The sheer size of the Volt Typhoon campaign has surprised experts, who believe that significant investment is needed to ensure the security of Critical National Infrastructure (CNI) worldwide. Daniel Cuthbert, a cybersecurity expert, highlighted the difficulty in defeating Volt Typhoon due to its use of “living off the land” technology. This approach does not involve installing any new files but relies on existing tools within computer systems, making detection challenging and allowing hackers to remain undetected for extended periods. The U.S. government’s cybersecurity agency has attributed the campaign to the Chinese government and warned about the potential disruptive effects in the event of geopolitical tensions or military conflicts.

The U.S. government has released a statement accusing the Chinese government of orchestrating the Volt Typhoon campaign, targeting critical infrastructure organizations in various sectors. The agencies involved have expressed concerns about the potential for hostile actors to use their network access for disruptive purposes during times of tension or conflict. Steve Morgan, founder of Cybersecurity Ventures, highlighted the catastrophic consequences that could have resulted from Volt Typhoon if not for the intervention of U.S. intelligence agencies. The continuous hacking efforts by China over the years have escalated, posing a persistent threat to U.S. citizens, businesses, organizations, governments, and political parties.

The U.S. authorities have confirmed that the Volt Typhoon campaign has compromised the IT environments of critical infrastructure organizations in sectors such as communications, energy, transportation systems, and water and wastewater systems. The pattern of behavior and choice of targets by Volt Typhoon is not consistent with traditional cyber espionage or intelligence operations, indicating a more disruptive intent. The U.S. government officials, including Commander of the U.S. Cyber Command and FBI Director Christopher Wray, have testified about the growing cyber threat posed by China and the need for vigilance in protecting critical infrastructure from such attacks. Despite the ongoing efforts to counter these threats, the hacking activities from China show no signs of abating, emphasizing the importance of cybersecurity measures in safeguarding vital systems and information.

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest Email Telegram WhatsApp Copy Link

You Might Like

Array

Array

Array

Array

Array

Array

Editors Picks

مرآة التاريخ: تحليل البناء السردي للدروس الخالدة في قصص الأنبياء والإسلام

4 weeks ago

السندات الحكومية والشركات: أساسيات الاستثمار الآمن والدخل الثابت

1 month ago

UAE Ranks Among Top Rugby Markets on TOD as British & Irish Lions Tour Kicks Off

5 months ago

Darven: A New Leap in AI-Powered Legal Technology Launching from the UAE to the World

6 months ago

Jordan to Host Iraq in the Final Round of the Asian World Cup Qualifiers After Securing Historic Spot

6 months ago

Latest News

فلسطين: قلبٌ ينبض بالصمود والأمل

7 months ago

Roland Garros 2025: A New Era of Viewing, A Tribute to Legends, and Moments to Remember

7 months ago

Array

7 months ago
Advertisement
Facebook X (Twitter) TikTok Instagram Threads
© 2025 West Timelines. All Rights Reserved. Developed By: Sawah Solutions
  • Privacy Policy
  • Terms
  • Contact

Type above and press Enter to search. Press Esc to cancel.