泄露的黑客文件引发人们对中国在战争中削弱美国的担忧
Leaked Hacking Files Spur Concerns Of China Weakening US For War

原始链接: https://www.zerohedge.com/political/leaked-hacking-files-spur-concerns-china-weakening-us-war

在最近的事件中,泄露的文件显示,中国的统治政权正在开展广泛的、全球协调的网络犯罪活动,旨在破坏对手的稳定,并在未来可能与美国发生冲突之前获得战略优势。 泄露的视频揭露了对世界各地关键机构的渗透,揭示了中国黑客在国家授权下运作或与相关政府机构有密切联系的证据。 这些揭露发生之际,中国对美国关键基础设施和机构进行了更广泛的网络攻击,其中黑客组织部署监视工具来监视中国境外的记者和持不同政见者,并针对欧洲各地的政府官员。 退役美国陆军上校约翰·米尔斯警告说,这种网络威胁代表了“超限战”,并凸显了美国响应能力的弱点,称其“不好”。 为了实现这些目标,中国制造的产品正在设计中加入能够进行入侵的后门,并且专门制造了嵌入先进通信技术的便携式设备,以方便驻扎在国际上的中国特工进行秘密行动。 仅 2001 年至 2018 年间,关键行业外包就导致超过 300 万个就业岗位流失,人们越来越担心美国继续依赖进口技术和产品,特别是中国制造的技术和产品。 随着华盛顿和北京之间的紧张局势加剧,美国总统乔·拜登警告称,中国的任何侵略行为都将导致中国立即做出反应,并可能导致亚洲冲突升级。

相关文章

原文

Authored by Andrew Thornebrooke via The Epoch Times (emphasis ours),

China’s communist regime is engaged in a worldwide campaign of cybercrime and leading experts believe that the United States is failing to respond swiftly enough to counter the threat.

In the current era of cyber, it’s all about speed,” retired Army Col. John Mills told The Epoch Times.

“You have to presume a breach, and that the threat is inside. Looking at it from that perspective, it’s all about speed of identification, speed of ejection. The U.S. government is not good at that.”

(Illustration by The Epoch Times, Getty Images, Shutterstock)

All signs indicate that the Chinese Communist Party (CCP) and its proxies are engaged in a robust and global cybercrime campaign that aims to both destabilize the regime’s foes and position itself for a potential war with the United States.

“This is an extraordinary threat,” said Mr. Mills, who previously served as the director of Cybersecurity Policy, Strategy, and International Affairs at the Department of Defense.

A cache of leaked documents that surfaced in late February implicated the regime’s direct involvement in overseas cyber espionage.

The documents belonged to a criminal hacking group called I-SOOn, which masquerades as a legitimate business in China, apparently with the regime’s blessing.

The leaked files revealed the group’s infiltration into government departments in India, South Korea, Thailand, Vietnam, and South Korea, as well as NATO organizations.

Files included product manuals, marketing materials, employee lists, chat records, financial information, and details about foreign infiltration efforts.

Some of the documents that were verified by the Associated Press show that the majority of the group’s clients are based within China’s regional security bureaus and the CCP’s Ministry of Public Security.

Mr. Mills said the revelation was “predictable,” and that CCP authorities have a long history of conducting illicit tasks in addition to their formal duties.

The CCP and the government, which is one [and] the same thing, knew these people were moonlighting. This is part of the culture of corruption [in China],” Mr. Mills said.

The I-SOOn leaks surfaced amid a wider flurry of CCP-backed cyber activity, in which the regime successfully infiltrated both U.S. critical infrastructure and the defense ministry of the Netherlands.

Volt Typhoon, a malware used to infiltrate U.S. systems and target critical infrastructure, was discovered last year, having been implanted as part of a wider effort to pre-position for a military conflict. The malware also threatened the physical safety of Americans by targeting water, energy, rail, airline and port traffic-control systems, according to intelligence leaders.

Casey Fleming, CEO of the risk advisory firm BlackOps Partners, said that the Volt Typhoon initiative was part of the CCP’s strategy of unrestricted warfare through which it aims to secure military advantage over the United States through non-military means.

“The CCP is hyper-focused on weakening the U.S. from all angles to win the war without fighting,” Mr. Fleming told The Epoch Times.

“This is what World War 3 looks like. It’s the speed of technology, the stealth of unrestricted warfare, and no rules.”

(Top) Chinese police and security staff watch as staff members enter the Japanese embassy in Beijing on Aug. 24, 2023. (Bottom) Workers prepare laptops that will be used during the 2022 Winter Olympics in Beijing on Dec. 9, 2021. (Greg Baker, Kevin Frayer/Getty Images)

The more recent I-SOOn leaks also shed light on the tools Chinese cybercriminals are deploying to infiltrate, undermine, and exploit the regime’s rivals.

Its services included a tool for infiltrating users’ accounts on social media platform X, including the ability to access phone numbers, email accounts, personal messages, and real-time activity even if users have enabled two-factor authentication.

Likewise I-SOOn sold access to a custom suite of remote-access Trojans—malware capable of infecting Android, IOS, and Windows devices—which could, at times, alter registry files and collect GPS data, contacts, media files, and real-time audio recordings of conversations.

The Android version of the Trojan also had the capability of dumping all messages stored in major Chinese apps including QQ, WeChat, Telegram, and Momo.

Notably, the I-SOOn documents also revealed the existence of portable devices for “attacking networks from the inside,” including options to embed the malware in cellphone batteries, power strips, and circuit boards.

Similar devices could be outfitted with special equipment for operatives working abroad to establish safe communication with mainland China.

Employees working on a smartphone assembly line at a factory in Dongguan, China, on July 20, 2022. (Top R) A shopper uses her smartphone to pay via a Wechat QR code at a vegetable market in Beijing on Nov. 3, 2020.

Mr. Mills said the regime is exploiting its advantage in the manufacturing domain to achieve dominance in cyberspace. China-based hackers are using manufacturing vulnerabilities in how devices connect and share data with one another.

And by smuggling malware into the United States with Chinese-made goods, he said, such devices could be used to penetrate the United States’ most critical infrastructure, as the Volt Typhoon malware was designed to do.

Mr. Mills said that the sheer diversity of systems used by different infrastructures in the United States makes it very difficult for the U.S. government to develop effective solutions to Chinese infiltration.

“The Internet of Things and critical infrastructure—that is still a very porous, vulnerable area,” Mr. Mills said.

Read more here...

联系我们 contact @ memedata.com