Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Strategic Infiltration: PRC Cyber Group Targets US Critical Infrastructure
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Strategic Infiltration: PRC Cyber Group Targets US Critical Infrastructure

Highlights

  • Volt Typhoon infiltrates U.S. infrastructure.

  • Group maintained access for over five years.

  • CISA issues detailed threat advisory.

NEWSLINKER
Last updated: 9 February, 2024 - 11:07 am 11:07 am
NEWSLINKER 1 year ago
Share
SHARE

A state-affiliated cyber espionage group from the People’s Republic of China, known as Volt Typhoon, has systematically infiltrated various U.S. critical infrastructure sectors, preparing for potential crises in times of conflict. The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings to these sectors regarding the threat, highlighting the risk to essential services in communication, energy, transportation, and water systems across the U.S. and its territories.

Contents
Advanced Techniques for Prolonged Covert AccessFive Years of Undetected Operations

Advanced Techniques for Prolonged Covert Access

Volt Typhoon has adeptly utilized advanced techniques to elude detection and maintain long-term access to compromised environments. The group employs legitimate user accounts and ‘living off the land’ strategies, which involve using the victim’s own systems and tools to conduct their operations. This method helps them stay under the radar while having persistent access to sensitive networks.

Five Years of Undetected Operations

Investigations reveal that Volt Typhoon has been operating undetected within some U.S. IT environments for a minimum of five years. The group has conducted extensive surveillance to familiarize themselves with the networks they target, enabling them to customize their attack strategies accordingly to ensure their longevity within these systems.

Once embedded, Volt Typhoon focuses on obtaining administrative credentials, often exploiting vulnerabilities in network appliances to gain initial access. They leverage these credentials to compromise entire domains, which include gaining the ability to access operational technology assets critical to the infrastructure’s functioning.

CISA’s security advisory provides comprehensive details on Volt Typhoon’s methodologies, tactics, and procedures. It also offers guidance on mitigations, signs of compromise, and further information to help organizations protect against such sophisticated cyber threats.

The implications of these revelations are significant, emphasizing the need for heightened cybersecurity vigilance among critical infrastructure providers in the U.S. and reinforcing the importance of international cooperation in combating state-sponsored cyber espionage activities.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Cyberattack Hits Aflac as Threats Target Insurance Industry

Hackers Drain $90 Million from Nobitex in Iran Cyberattacks

Researchers Expose Grok and Mixtral as Sources for Jailbroken AI Tools

Hacktivists Strike Bank Sepah, Disrupt Iran’s Key Financial Services

Cyber Experts Urge Stronger Volunteer Networks to Safeguard Key Groups

Share This Article
Facebook Twitter Copy Link Print
By NEWSLINKER
NEWS LINKER is your premier source for the latest in business, finance, science, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Dive deep into the world of cutting-edge developments, breakthroughs, market trends, and game-changing innovations..
Previous Article Trelleborg Expands Medical Technology Presence with Baron Group Acquisition
Next Article Armored Core 6: Fires Of Rubicon Review

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tesla Launches Robotaxi Service in Austin, Serving Real Passengers
Electric Vehicle
Sega Discloses Major Game Sales Figures in Accidental Leak
Gaming
Tesla Rolls Out Driverless Robotaxi Service in Austin
Electric Vehicle
Tesla Launches Robotaxi Service for Public Rides in Austin
Electric Vehicle
FDA Grants Levita Magnetics Expanded Clearance for MARS Robotic System
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?