Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

BlueSky blocks Mississippi services across age guarantee laws

August 24, 2025

Openai warns against SPVs and other “unauthorized” investments

August 23, 2025

Amazon AGI Labs Chief defends his reverse Acquihire

August 23, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    BlueSky blocks Mississippi services across age guarantee laws

    August 24, 2025

    BlueSky blocks Mississippi services across age guarantee laws

    August 22, 2025

    Tiktok denies India's comeback after reporting that the website has been published

    August 22, 2025

    Google makes it easier to edit drive videos with the new VIDS shortcut button

    August 22, 2025

    X brings out the ability to like and follow the free tier of developer APIs

    August 22, 2025
  • Crypto

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025
  • Security

    Developers get prison time to disrupt the ex-employer's network with “kill switch”

    August 22, 2025

    Explain why hackers who exposed the North Korean government did that

    August 21, 2025

    Device searches at US borders hit record-breaking records, new data show

    August 20, 2025

    Listen and record all conversations “Always On” Harvard Dropout launches AI smart glasses

    August 20, 2025

    New Zero-Day startup offers $20 million for a tool that can hack your smartphone

    August 20, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Openai warns against SPVs and other “unauthorized” investments

    August 23, 2025

    Amazon AGI Labs Chief defends his reverse Acquihire

    August 23, 2025

    Y Combinator says Apple's App Store is hampering startup growth

    August 22, 2025

    Beanie baby in the brain rot era

    August 22, 2025

    Strictlyvc at atrupt 2025: Inside the LP track

    August 21, 2025
TechBrunchTechBrunch

Chinese-backed Bolt Typhoon hacker hid inside US critical infrastructure for 'at least five years'

TechBrunchBy TechBrunchFebruary 7, 20243 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Chinese-backed hackers maintain access to critical U.S. infrastructure for “at least five years” with a long-term goal of launching “destructive” cyberattacks, a coalition of U.S. intelligence agencies warned on Wednesday. .

Bolt Typhoon, a state-sponsored hacker group based in China, has a network of unnamed airline, rail, public transportation, highway, shipping, pipeline, and water and wastewater organizations. in order to prevent the attack. In a joint advisory released Wednesday, the NSA, CISA and FBI said they are preparing themselves for devastating cyberattacks.

This marks a “strategic shift” in traditional cyber espionage and intelligence-gathering operations by Chinese-backed hackers, instead focusing on disrupting operational techniques in the event of a major conflict or crisis. Government agencies said they were preparing.

The publication of the advisory, co-signed by cybersecurity agencies from the UK, Australia, Canada and New Zealand, comes a week after a similar warning by FBI Director Christopher Wray. During a hearing of the US House of Representatives Committee on Cyber ​​Threats from China, Wray described Bolt Typhoon as “the defining threat of our generation” and said the group's objective was to “prevent military forces” in the early stages of the war. “It disrupts our ability to mobilize,” he said. Clashes are expected over Taiwan, which China claims as territory.

According to Wednesday's technical advisory, Bolt Typhoon is exploiting vulnerabilities in routers, firewalls, and VPNs to gain initial access to critical infrastructure across the country. According to the advisory, Chinese-backed hackers typically leverage stolen administrator credentials to maintain access to these systems, in some cases for “at least five years.” That's what it means.

This access allowed state-sponsored hackers to “manipulate heating, ventilation, and air conditioning (HVAC) systems in server rooms and disrupt critical energy and water controls, leading to major infrastructure failures,” among other things. The advisory warns that it is now possible to carry out potential disruption. In some cases, the Bolt Typhoon hackers had the ability to access camera surveillance systems at critical infrastructure facilities, although it is not clear whether they did so.

Volt Typhoon also used resident techniques, where attackers use legitimate tools and capabilities already present on the target system to remain undetected and maintain long-term persistence. The hackers also conducted “extensive pre-breach reconnaissance” to avoid detection. “For example, in some cases, the Bolt Typhoon attackers may have refrained from using compromised credentials outside of normal business hours to avoid triggering security alerts for anomalous account activity.” says the recommendation.

“Bolt Typhoon is not the only Chinese state-sponsored cyberattacker conducting this type of activity,” senior U.S. intelligence officials warned in a call Wednesday, but there are other groups they are tracking. His name was not disclosed.

Last week, the FBI and the U.S. Department of Justice announced they had disrupted the KV botnet, run by Bolt Typhoon, which compromised hundreds of U.S.-based routers for small businesses and home offices. The FBI announced that it was able to remove malware from a hijacked router and disconnect it from Chinese state-sponsored hackers.

According to a May 2023 report published by Microsoft, Bolt Typhoon has been targeting and infiltrating critical infrastructure in the United States since at least mid-2021.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Developers get prison time to disrupt the ex-employer's network with “kill switch”

August 22, 2025

Explain why hackers who exposed the North Korean government did that

August 21, 2025

Device searches at US borders hit record-breaking records, new data show

August 20, 2025

Listen and record all conversations “Always On” Harvard Dropout launches AI smart glasses

August 20, 2025

New Zero-Day startup offers $20 million for a tool that can hack your smartphone

August 20, 2025

US spy chief says the UK has removed demand for apple backdoors

August 19, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

BlueSky blocks Mississippi services across age guarantee laws

August 24, 2025

Openai warns against SPVs and other “unauthorized” investments

August 23, 2025

Amazon AGI Labs Chief defends his reverse Acquihire

August 23, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.