Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: FBI Highlights Risks in China’s Dependence on Tech Firms for Hacking
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

FBI Highlights Risks in China’s Dependence on Tech Firms for Hacking

Highlights

  • China faces scrutiny for using local tech firms in cyber offensives.

  • International agencies are boosting information sharing against hacking groups.

  • Experts urge vigilant cybersecurity across organizations, regardless of size.

Kaan Demirel
Last updated: 29 August, 2025 - 5:19 pm 5:19 pm
Kaan Demirel 6 hours ago
Share
SHARE

A recent international warning has brought renewed focus to the alleged collaboration between Chinese technology companies and state-backed hacking groups. The alert, issued by several cyber agencies, claims that Chinese firms have assisted groups such as Salt Typhoon in conducting cyberespionage activities worldwide. International concern grows as these groups target sensitive sectors, causing policymakers to re-evaluate the effectiveness of China’s approach to offensive cyber operations. In response, officials stress the need for robust countermeasures across both public and private sectors regardless of organization size, noting that vulnerabilities can emerge anywhere. As digital networks interconnect globally, any mistake by an actor can rapidly widen the risk landscape for multiple nations.

Contents
Why Does Outsourcing Increase Beijing’s Exposure?How Are International Agencies Responding?Will New Legal Obligations in China Impact These Activities?

Reporting from previous investigations into Chinese cyber activities consistently described advanced planning and operational discipline by government-linked groups. Analysts had suggested that using domestic companies helped shield Chinese interests and increase operational resilience. However, the current findings suggest that this approach introduces oversight challenges for Beijing, occasionally enabling foreign investigators to trace malicious activity back to the source and attribute incidents with greater certainty.

Why Does Outsourcing Increase Beijing’s Exposure?

Security experts point out that China’s use of private technology companies to support cyber operations complicates command and control. The decentralized nature of these companies leads to inconsistent implementation, increasing the likelihood of operational mistakes. As FBI cyber division deputy assistant director Jason Bilnoski notes, the approach can compromise government objectives:

“These enabling companies, they failed,”

he said, citing recent investigations that have uncovered details about such operations.

How Are International Agencies Responding?

Global cyber agencies have expanded their monitoring, drawing attention to networks operated by companies such as Sichuan Juxinhe Network Technology, which faces U.S. sanctions. Coordination between international bodies has increased, with the intent of sharing threat intelligence and responding collaboratively to incidents. The warning released this week traces activity back to at least 2021, highlighting ongoing coordination among agencies to mitigate cyber threats attributed to Chinese organizations.

Will New Legal Obligations in China Impact These Activities?

China has enacted a series of regulations since 2014 that affect corporate data handling and national security compliance. Despite these rules, reports indicate that companies can still be involved in state-directed hacking, potentially without clear government oversight. These factors have sometimes allowed foreign investigators to exploit regulatory gaps and detect nefarious activity. Bilnoski further commented:

“We need the American people, we need our partners around the world to take action here, not just with Salt Typhoon, but with all the indiscriminate actions that the CCP has been undertaking over the last few years.”

Attribution of cyberattacks remains a complex endeavor, often obstructed by denials and lack of response from Chinese companies accused of participating in hacking campaigns. Industry analysts maintain that continuous sharing of intelligence and responsive measures are needed to strengthen cyber defense. Agencies caution that no single sector or nation remains immune to such activities, advising both multinational corporations and smaller businesses to remain vigilant in cybersecurity practices.

The issue of reliance on domestic vendors in state-sponsored hacking efforts highlights a nuanced vulnerability in China’s cyber strategy. While regulatory frameworks are meant to bolster control, enforcement gaps can weaken state supervision, resulting in operational errors. For international stakeholders, staying informed about attribution developments and maintaining proactive defense postures is vital. Government alerts and cross-sector collaboration remain key in deterring the broader threat landscape posed by persistent cyber groups such as Salt Typhoon.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Salesloft Drift Attack Compromises Major Integrations Across Platforms

Treasury Targets Facilitators in North Korea IT Worker Scheme

Storm-0501 Exploits Cloud Gaps to Target Hybrid Infrastructures

Citrix Faces New Urgent Security Threats Through NetScaler Vulnerabilities

Hackers Target Hundreds of Salesforce Customers Using Stolen OAuth Tokens

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Tesla Rolls Out New Model Y Performance with Enhanced Features
Next Article RealMan Launches Beijing Training Center to Boost Robotics Data

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tesla Details Plans for Semi Expansion, Optimus, and Robotaxi Growth
Electric Vehicle
RealSense Partners With NVIDIA, Launches D555 Depth Camera
AI Robotics
FTC Orders Workado to Change AI Detector Advertising Claims
Technology
Tesla Rolls Out Full Self-Driving Suite to Australian Owners
Electric Vehicle
Tessa Lau Shares Industry Insights at RoboBusiness Women in Robotics Lunch
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?