Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Slow Venture cuts initial checks from $60 million creator fund to woodworking founders

August 11, 2025

iOS 26 Beta 6 adds new ringtones, launching Snappy apps and more

August 11, 2025

Poshmark CEO and founder to resign

August 11, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    iOS 26 Beta 6 adds new ringtones, launching Snappy apps and more

    August 11, 2025

    Poshmark CEO and founder to resign

    August 11, 2025

    Ocean's new app brings inbox triage, tasks and invites Gmail users

    August 11, 2025

    Apple's new Siri may allow users to use voice to interact with apps

    August 11, 2025

    Simple little apps that can be replaced by RIP, Microsoft lenses, and AI

    August 8, 2025
  • Crypto

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025

    Indian Crypto ExchangeCoindCX confirms $44 million stolen during hack

    July 21, 2025

    North Korean hackers blamed record-breaking spikes in 2025

    July 17, 2025

    Bitcoin surpasses $118K at the second highest high in 24 hours

    July 11, 2025
  • Security

    US government seized $1 million from a Russian ransomware gang

    August 11, 2025

    Electronic Arts Blocks Over 300,000 Civil Act after launching Battlefield 6 Beta

    August 11, 2025

    Automaker web portal security flaws

    August 11, 2025

    After researchers masked prolific SMS scammers, new operations emerged as a result

    August 10, 2025

    Data breaches at French telecom giant Bouigs impact millions of customers

    August 7, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Slow Venture cuts initial checks from $60 million creator fund to woodworking founders

    August 11, 2025

    Abandon the VC norms and find capital on your own terms in 2025

    August 11, 2025

    Book an exhibition table before competitors make it 2025

    August 8, 2025

    What Founders Need to Know Before Choosing an Exit in 2025

    August 8, 2025

    High cost and thin margins threaten AI coding startups

    August 7, 2025
TechBrunchTechBrunch

Introducing China's “Typhoon” hackers who are preparing for war

TechBrunchBy TechBrunchOctober 13, 20245 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Few cybersecurity risks facing the United States today loom as large as the potential sabotage by Chinese-backed hackers, which U.S. officials have described as an “epoch-making threat.” are.

In recent months, U.S. intelligence officials say hackers backed by the Chinese government have penetrated deep into the networks of critical U.S. infrastructure, including water, energy and transportation systems. Officials say the goal is to lay the groundwork for a potentially devastating cyberattack in the event of a future conflict between China and the United States, including over a possible Chinese invasion of Taiwan. .

FBI Director Christopher Wray said earlier this year that “If China decides the time is right for an attack, Chinese hackers are prepared to wreak havoc on American infrastructure and cause real-world harm to American citizens and communities.'' “We are doing this,” he told lawmakers.

The US government and its allies have since taken action against the Chinese Typhoon family of hackers and released new details about the threat they pose.

In January, the United States thwarted Bolt Typhoon, a Chinese government hacker group tasked with setting the stage for a devastating cyber attack. In late September, federal authorities took over a botnet run by another Chinese hacker group called Flax Typhoon. The group posed as a private company in Beijing and was responsible for concealing the activities of Chinese government hackers. Since then, a new Chinese-backed hacker group called “Salt Typhoon” has emerged and compromised the eavesdropping systems of U.S. phone and internet providers, thereby exposing Americans and potential targets of U.S. surveillance. It is now possible to collect information about

Here's what we know so far about the Chinese hacker group preparing for war.

bolt typhoon

Bolt Typhoon represents a new breed of Chinese-backed hacker group. According to the FBI director, the goal is no longer just to steal U.S. secrets, but rather to disrupt the “mobilization capabilities” of the U.S. military.

Microsoft first identified Bolt Typhoon in May 2023, and hackers have been hacking routers, firewalls, VPNs, and more since mid-2021 as part of an ongoing and coordinated effort to penetrate deep into America's critical infrastructure. We discovered that the malware had been targeting and compromising network equipment. In reality, the hackers may have been active for much longer. In some cases, it can last as long as 5 years.

Volt Typhoon compromised thousands of internet-connected devices in the months after Microsoft reported a vulnerability in internet-connected devices that caused them to be considered “end of life” and no longer receive security updates. was exploited. As such, the hacker group subsequently succeeded in compromising the IT environments of multiple critical infrastructure sectors, including aviation, water, energy, and transportation, setting the stage for future destructive cyberattacks.

“These attackers did not collect secret information or steal secrets, which is common in the United States. They probed sensitive critical infrastructure so that they could disrupt key services if ordered to do so. ,” said Commissioner John Hultquist. Analyst at security company Mandiant.

In January, the US government announced that it had successfully destroyed the botnet used by Bolt Typhoon. The botnet is made up of thousands of hijacked U.S.-based small office and home network routers used by Chinese hackers to hide malicious activity targeting sensitive U.S. information. was using this botnet. infrastructure. The FBI announced that it was able to remove malware from a hijacked router and disconnect it from a Chinese hacker group and botnet.

flax typhoon

Flax Typhoon, first exposed in Microsoft's August 2023 report, is another Chinese-backed hacker group that officials say operated under the guise of a publicly traded cybersecurity company based in Beijing. I am doing it. The company's Integrity Technology Group has publicly acknowledged its ties to the Chinese government, U.S. officials said.

In September, the US government announced that it had taken control of another botnet used by Flax Typhoon, which leverages a custom variant of the notorious Mirai malware, consisting of hundreds of thousands of internet-connected devices.

U.S. officials said at the time that the Flax Typhoon-controlled botnet was used for “malicious cyber activity disguised as routine internet traffic from infected consumer devices.” Prosecutors said the botnet operated by Flax Typhoon enabled other Chinese government-backed hackers to “infiltrate networks in the United States and around the world to steal information and compromise our nation's infrastructure.” said.

Flax Typhoon has been active since mid-2021 and primarily targets “government agencies and education, critical manufacturing, and information technology organizations in Taiwan,” according to Microsoft's government support group profile. The Justice Department corroborated Microsoft's findings, saying Flax Typhoon also “attacked multiple U.S. and foreign companies.”

salt typhoon

The latest, and perhaps creepiest, group of Chinese government-backed cyber forces discovered in recent months is Salt Typhoon.

Salt Typhoon made headlines in October for a more advanced operation. As first reported by the Wall Street Journal, a China-linked hacker group is believed to have compromised the eavesdropping systems of several U.S. telecommunications and internet providers, including AT&T, Lumen (formerly CenturyLink), and Verizon. There is.

According to one report, Salt Typhoon may have used compromised Cisco routers to access these organizations. The US government is said to be in the early stages of an investigation.

The scale of the breach by internet providers remains unclear, but the magazine cited national security officials as saying the breach could be “potentially catastrophic.” Salt Typhoon fulfilled many of the U.S. government's requests by hacking systems used by law enforcement to collect court-sanctioned customer data, including potential Chinese identities for U.S. surveillance. The data and systems we store could be accessed.

It's not yet clear when the breach occurred, but the Journal reports that the hackers may have had access to the internet provider's eavesdropping systems for “months or more.”



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

US government seized $1 million from a Russian ransomware gang

August 11, 2025

Electronic Arts Blocks Over 300,000 Civil Act after launching Battlefield 6 Beta

August 11, 2025

Automaker web portal security flaws

August 11, 2025

After researchers masked prolific SMS scammers, new operations emerged as a result

August 10, 2025

Data breaches at French telecom giant Bouigs impact millions of customers

August 7, 2025

Rivalry apps for men leak user personal data and driver's license

August 6, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Slow Venture cuts initial checks from $60 million creator fund to woodworking founders

August 11, 2025

iOS 26 Beta 6 adds new ringtones, launching Snappy apps and more

August 11, 2025

Poshmark CEO and founder to resign

August 11, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.