Cyberwarfare by China
Cyberwarfare by China is the aggregate of all combative activities in the cyberspace which are taken by organs of the China , including affiliated advanced persistent threat groups, against other countries.
Organization
While some details remain unconfirmed, it is understood that China organizes its resources as follows:
- “Specialized military network warfare forces” (Chinese: 军队专业网络战力量) - Military units specialized in network attack and defense.
- "PLA-authorized forces” (授权力量) - network warfare specialists in the Ministry of State Security (MSS) and the Ministry of Public Security (MPS).
- “Non-governmental forces” (民间力量) - civilian and semi-civilian[definition needed] groups that spontaneously engage in network attack and defense.[1]
In 2017, Foreign Policy provided an estimated range for China's "hacker army" personnel, anywhere from 50,000 to 100,000 individuals.[2]
In response to claims that Chinese universities, businesses, and politicians have been subject to cyber espionage by the United States National Security Agency since 2009,[3][4] the PLA announced a cyber security squad in May 2011 to defend their own networks.[5]
List of APTs
Since Xi Jinping became General Secretary of the Chinese Communist Party in 2012, the Ministry of State Security gained more responsibility over cyberespionage vis-à-vis the People's Liberation Army, and currently oversees various APT groups.[6] According to security researcher Timo Steffens, "the APT landscape in China is run in a 'whole country' approach, leveraging skills from universities, individual, and private and public sectors".[7]
- PLA Unit 61398 (also known as APT1)
- PLA Unit 61486 (also known as APT2)
- Buckeye (also known as APT3)[8]
- Red Apollo (also known as APT10)
- Numbered Panda (also known as APT12)
- DeputyDog (also known as APT17)[9]
- Codoso Team (also known as APT19)
- Wocao (also known as APT20)[10][11]
- APT 27[12]
- PLA Unit 78020 (also known as APT30 and Naikon)
- Zirconium[13] (also known as APT31 and Violet Typhoon)[14][15]
- Periscope Group (also known as APT40)
- Double Dragon[16] (also known as APT41, Winnti Group, Barium, or Axiom)[17][18][19]
- Dragonbridge[20]
- Hafnium[21][22]
- LightBasin[23][24] (Also known as UNC1945)
- Tropic Trooper[25][26]
- Volt Typhoon[27]
Accusations of espionage and cyber-attacks
Australia
In May 2013, ABC News claimed that the Chinese government stole blueprints to the headquarters of the Australian Security Intelligence Organisation (ASIO).[28] In May 2023, Australia, alongside other Five Eyes member states, identified the Chinese government behind the "Volt Typhoon" advanced persistent threat targeting critical infrastructure.[29]
Canada
Officials in the Canadian government claimed that Chinese hackers compromised several departments within the federal government in early 2011, though the Chinese government has denied involvement.[30] In 2014, Canada's Chief Information Officer claimed that Chinese hackers compromised computer systems within the National Research Council.[31] In May 2023, Canada's Communications Security Establishment identified the Chinese government as being behind the "Volt Typhoon" advanced persistent threat targeting critical infrastructure.[32]
India
Officials in the Indian government believe that attacks on Indian government networks, such as the attack on the Indian National Security Council, have originated from China. According to the Indian government, Chinese hackers are experts in operating botnets, of which were used in these attacks.[33] Additionally, other instances of Chinese cyberattacks against India's cyberspace have been reported in multitude.[34][35]
Japan
In April 2021 Japan claimed that the Chinese military ordered cyberattacks on about 200 Japanese companies and research institutes, including JAXA.[36]
New Zealand
In May 2023, New Zealand, alongside other Five Eyes member states, named the Chinese government as being behind the "Volt Typhoon" advanced persistent threat targeting critical infrastructure.[37]
United States
The United States has accused China of cyberwarfare attacks that targeted the networks of important American military, commercial, research, and industrial organizations. A Congressional advisory group has declared China "the single greatest risk to the security of American technologies"[38] and "there has been a marked increase in cyber intrusions originating in China and targeting U.S. government and defense-related computer systems".[38][39][40][41]
In January 2010, Google reported targeted attacks on its corporate infrastructure originating from China "that resulted in the theft of intellectual property from Google." Gmail accounts belonging to two human rights activists were compromised in an attack on Google's password system.[42] Chinese hackers also gained access to a database containing classified information about suspected spies, agents, and terrorists under surveillance by the US government.[43] American security experts connected the Google attack to various other political and corporate espionage efforts originating from China, which included spying against military, commercial, research, and industrial corporations.[41] Obama administration officials called the cyberattacks "an increasingly serious cyber threat to US critical industries."[39]
In addition to Google, at least 34 other companies have been attacked. Reported cases include Northrop Grumman, Symantec, Yahoo, Dow Chemical, and Adobe Systems.[44] Cyber-espionage has been aimed at both commercial and military interests.[45]
Diplomatic cables highlight US concerns that China is exploiting its access to Microsoft source code to boost its offensive and defensive capabilities.[46]
A number of private computer security firms have stated that they have growing evidence of cyber-espionage efforts originating from China, including the "Comment Group".[47]
China has denied accusations of cyberwarfare,[48] and has accused the United States of engaging in cyber-warfare against it, accusations which the United States denies.[49][50][51][52][53]
During March 2013, high-level discussions continued.[54]
In May 2014, a federal grand jury in the United States indicted five PLA Unit 61398 officers on charges of theft of confidential business information from U.S. commercial firms and planting malware on their computers.[55][56]
In September 2014, a Senate Armed Services Committee probe revealed hackers associated with the Chinese government committing various intrusions of computer systems belonging to U.S. airlines, technology companies and other contractors involved with the movement of U.S. troops and military equipment,[57] and in October 2014, The FBI added that hackers, who they believe to be backed by the Chinese government, have recently launched attacks on U.S. companies.[58]
In 2015, the U.S Office of Personnel Management (OPM) announced that it had been the target of a data breach targeting the records of as many as 21.5 million people.[59] The Washington Post reported that the attack came from China, citing unnamed government officials.[60] FBI director James Comey explained "it is a very big deal from a national security perspective and a counterintelligence perspective. It's a treasure trove of information about everybody who has worked for, tried to work for, or works for the United States government."[61]
In 2019, a study showed continued attacks on the US Navy and its industrial partners.[62]
In February 2020, a US federal grand jury charged four members of China's People's Liberation Army (PLA) with the 2017 Equifax hack.[63] The official account of FBI stated on Twitter that they played a role in "one of the largest thefts of personally identifiable information by state-sponsored hackers ever recorded", involving "145 million Americans".[64]
The Voice of America reported in April 2020 that "U.S. intelligence agencies concluded the Chinese hackers meddled in both the 2016 and 2018 elections" and said "there have already been signs that China-allied hackers have engaged in so-called "spear-phishing" attacks on American political targets" ahead of the 2020 United States elections.[65]
In March 2021, United States intelligence community released analysis in finding that China had considered interfering with the election but decided against it on concerns it would fail or backfire.[66]
In April 2021, FireEye said that suspected Chinese hackers used a zero-day attack against Pulse Connect Secure devices, a VPN device, in order to spy on dozens of government, defense industry and financial targets in the U.S. and Europe.[67][68][69][70]
In May 2023, Microsoft and Western intelligence agencies reported that a Chinese state-sponsored hacking group affiliated with the PLA called "Volt Typhoon" had targeted critical infrastructure and military installations in Guam, Hawaii, Texas and elsewhere.[71][72][73]
Taiwan
Comparing the semiconductor industry in China mainland and Taiwan today, Taiwan is the leader in terms of overall competitiveness. On 6 August 2020, Wired published a report, stating that "Taiwan has faced existential conflict with China for its entire existence and has been targeted by China's state-sponsored hackers for years. But an investigation by one Taiwanese security firm has revealed just how deeply a single group of Chinese hackers was able to penetrate an industry at the core of the Taiwanese economy, pillaging practically its entire semiconductor industry."[74]
Ukraine
In April 2022, The Times reported that days prior to the start of the 2022 Russian invasion of Ukraine, a cyberwarfare unit of the People's Liberation Army launched cyberattacks against hundreds of Ukrainian government sites, according to officials of the Security Service of Ukraine.[75][76]
United Kingdom
In May 2023, the UK's National Cyber Security Centre, alongside other Five Eyes member states, identified the Chinese government behind the "Volt Typhoon" advanced persistent threat targeting critical infrastructure.[29][77]
The Vatican
In July 2020 it was reported that Chinese state-sponsored hackers operating under the named RedDelta hacked the Vatican's computer network ahead of negotiations between China and the Vatican.[78]
IP hijacking
During 18 minutes on April 8, 2010, state-owned China Telecom advertised erroneous network routes that instructed "massive volumes" of U.S. and other foreign Internet traffic to go through Chinese servers. A US Defense Department spokesman told reporters that he did not know if "we've determined whether that particular incident ... was done with some malicious intent or not" and China Telecom denied the charge that it "hijacked" U.S. Internet traffic.[79]
See also
- 2011 Canadian government hackings
- Beijing–Washington cyber hotline
- Chinese intelligence activity abroad
- Chinese information operations and information warfare
- Cyberwarfare by Russia
- Death of Shane Todd
- GhostNet
- Google China
- Honker Union
- List of cyber warfare forces - China
- Operation Aurora
- Operation Shady RAT
- Titan Rain
- People's Liberation Army Strategic Support Force
- PLA Unit 61398
- Red Apollo
- 2021 Microsoft Exchange Cyberattack
References
- ↑ Elegant, Simon (November 18, 2009). "Cyberwarfare: The Issue China Won't Touch". Time (magazine). http://www.time.com/time/world/article/0,8599,1940009,00.html. Retrieved October 25, 2010.
- ↑ "China's Hacker Army ". Foreign Policy.
- ↑ "Archived copy". The Washington Post. https://www.washingtonpost.com/world/asia_pacific/leaker-snowdens-allegations-about-us-hacking-give-china-new-edge-in-cyber-war-of-words/2013/06/13/986c0092-d419-11e2-b3a2-3bf5eb37b9d0_story.html.
- ↑ "Snowden says U.S. hacking targets China; NSA points to thwarted attacks". The Japan Times. June 14, 2013. http://www.japantimes.co.jp/news/2013/06/14/world/u-s-hacking-effort-targets-china-snowden/.
- ↑ Beech, Hannah. "Meet China's Newest Soldiers: An Online Blue Army". Time, 27 May 2011.
- ↑ Mozur, Paul; Buckley, Chris (2021-08-26). "Spies for Hire: China's New Breed of Hackers Blends Espionage and Entrepreneurship" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/2021/08/26/technology/china-hackers.html.
- ↑ Stone, Jeff (October 5, 2020). "Foreign spies use front companies to disguise their hacking, borrowing an old camouflage tactic". Cyberscoop. https://www.cyberscoop.com/chinese-iranian-hackers-front-companies/.
- ↑ "Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak". Symantec. 2019-05-07. https://www.symantec.com/blogs/threat-intelligence/buckeye-windows-zero-day-exploit.
- ↑ "APT17: Hiding in Plain Sight - FireEye and Microsoft Expose Obfuscation Tactic". FireEye. May 2015. https://www2.fireeye.com/rs/fireye/images/APT17_Report.pdf.
- ↑ van Dantzig, Maarten; Schamper, Erik (2019-12-19). "Wocao APT20". fox-it.com. NCC Group. https://resources.fox-it.com/rs/170-CAK-271/images/201912_Report_Operation_Wocao.pdf.
- ↑ Vijayan, Jai (December 19, 2019). "China-Based Cyber Espionage Group Targeting Orgs in 10 Countries". Dark Reading. https://www.darkreading.com/attacks-breaches/china-based-cyber-espionage-group-targeting-orgs-in-10-countries/d/d-id/1336676.
- ↑ Lyngaas, Sean (10 August 2021). "Chinese hackers posed as Iranians to breach Israeli targets, FireEye says". https://www.cyberscoop.com/china-israel-iran-fireeye-hacking/.
- ↑ Lyngaas, Sean (February 12, 2019). "Right country, wrong group? Researchers say it wasn't APT10 that hacked Norwegian software firm". Cyberscoop. https://www.cyberscoop.com/apt10-apt31-recorded-future-rapid7-china/.
- ↑ Lyngaas, Sean (October 16, 2020). "Google offers details on Chinese hacking group that targeted Biden campaign". https://www.cyberscoop.com/biden-chinese-hacking-google-security-russia/.
- ↑ "How Microsoft names threat actors". Microsoft. January 16, 2024. https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming.
- ↑ "Double Dragon APT41, a dual espionage and cyber crime operation". FireEye. 2019-10-16. https://content.fireeye.com/apt-41/rpt-apt41/.
- ↑ "Bureau names ransomware culprits". Taipei Times. May 17, 2020. https://www.taipeitimes.com/News/taiwan/archives/2020/05/17/2003736564.
- ↑ Tartare, Mathieu; Smolár, Martin (21 May 2020). "No "Game over" for the Winnti Group". We Live Security. https://www.welivesecurity.com/2020/05/21/no-game-over-winnti-group/.
- ↑ Greenberg, Andy (August 6, 2020). "Chinese Hackers Have Pillaged Taiwan's Semiconductor Industry". Wired. https://www.wired.com/story/chinese-hackers-taiwan-semiconductor-industry-skeleton-key/. Retrieved 7 August 2020.
- ↑ Sabin, Sam (October 26, 2022). "New pro-China disinformation campaign targets 2022 elections: Report". Axios. https://www.axios.com/2022/10/26/disinformation-campaign-midterms-china-dragonbridge-mandiant.
- ↑ Naraine, Ryan (2021-03-02). "Microsoft: Multiple Exchange Server Zero-Days Under Attack by Chinese Hacking Group" (in English). Wired Business Media. https://www.securityweek.com/microsoft-4-exchange-server-zero-days-under-attack-chinese-apt-group.
- ↑ Burt, Tom (2021-03-02). "New nation-state cyberattacks" (in English). Microsoft. https://blogs.microsoft.com/on-the-issues/2021/03/02/new-nation-state-cyberattacks/.
- ↑ Nichols, Shaun (2021-10-20). "'LightBasin' hackers spent 5 years hiding on telco networks". https://www.techtarget.com/searchsecurity/news/252508413/LightBasin-hackers-spent-5-years-hiding-on-telco-networks.
- ↑ Ilascu, Ionut (2021-10-19). "LightBasin hacking group breaches 13 global telecoms in two years". https://www.bleepingcomputer.com/news/security/lightbasin-hacking-group-breaches-13-global-telecoms-in-two-years/.
- ↑ Chen, Joey (12 May 2020). "Tropic Trooper's Back: USBferry Attack Targets Air-gapped Environments". Trend Micro. https://blog.trendmicro.com/trendlabs-security-intelligence/tropic-troopers-back-usbferry-attack-targets-air-gapped-environments/.
- ↑ Cimpanu, Catalin. "Hackers target the air-gapped networks of the Taiwanese and Philippine military". https://www.zdnet.com/article/hackers-target-the-air-gapped-networks-of-the-taiwanese-and-philippine-military/.
- ↑ Intelligence, Microsoft Threat (2023-05-24). "Volt Typhoon targets US critical infrastructure with living-off-the-land techniques" (in en-US). https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/.
- ↑ "George Brandis briefed by ASIO on claims China stole classified blueprints of Canberra headquarters". ABC News. May 29, 2013. http://www.abc.net.au/news/2013-05-29/brandis-briefed-by-asio-on-china-hacking-claims/4719886.
- ↑ 29.0 29.1 Evans, Jake (2023-05-24). "Australia joins intelligence partners to blame China for US infrastructure cyber attack" (in en-AU). ABC News. https://www.abc.net.au/news/2023-05-25/australian-intelligence-blames-china-for-us-hack/102390024.
- ↑ "Foreign hackers attack Canadian government". CBC. February 16, 2011. http://www.cbc.ca/politics/story/2011/02/16/pol-weston-hacking.html.
- ↑ "Chinese cyberattack hits Canada's National Research Council". CBC. July 29, 2014. http://www.cbc.ca/news/politics/chinese-cyberattack-hits-canada-s-national-research-council-1.2721241.
- ↑ Boynton, Sean (May 24, 2023). "A Chinese cyber espionage operation is hitting U.S. infrastructure, West warns" (in en-US). https://globalnews.ca/news/9720663/canada-five-eyes-china-cyber-threat/.
- ↑ "China mounts cyber attacks on Indian sites". The Times of India (India). May 5, 2008. http://articles.timesofindia.indiatimes.com/2008-05-05/india/27760718_1_cyber-warfare-government-networks-china.
- ↑ "'നിശബ്ദ യുദ്ധ'ത്തിന് പിന്നിൽ ചൈന; ടാർഗറ്റ് ഇന്ത്യയും അമേരിക്കയും". ManoramaOnline. https://www.manoramaonline.com/technology/technology-news/2018/06/06/china-linked-to-cyberattacks-dating-from-2009-report-says.html.
- ↑ Rising, David (2022-04-07). "Chinese hackers reportedly target India's power grid" (in en). https://apnews.com/article/technology-business-china-india-b9e32f0d36843b2ac2764d0b4ae2c7e6.
- ↑ "Chinese military seen behind Japan cyberattacks" (in en-US). 2021-04-20. https://www.japantimes.co.jp/news/2021/04/20/national/chinese-military-japan-cyberattacks/.
- ↑ Ensor, Jamie (25 May 2023). "New Zealand, Five Eyes issue alert warning of China state actor engaging in 'malicious cyber activity'" (in en). Newshub. https://www.newshub.co.nz/home/politics/2023/05/new-zealand-five-eyes-issues-alert-warning-of-china-state-actor-engaging-in-malicious-cyber-activity.html.
- ↑ 38.0 38.1 Claburn, Thomas. "China Cyber Espionage Threatens U.S., Report Says". InformationWeek. http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=221900505.
- ↑ 39.0 39.1 Cha, Ariana Eunjung and Ellen Nakashima, "Google China cyberattack part of vast espionage campaign, experts say". The Washington Post. January 14, 2010.
- ↑ McMillan, Robert (October 23, 2009). "Report Says China Ready for Cyber-war, Espionage". PC World. http://www.pcworld.com/article/174210/report_says_china_ready_for_cyberwar_espionage.html.
- ↑ 41.0 41.1 Gorman, Siobhan (2009-04-09). "Electricity Grid in U.S. Penetrated By Spies" (in en-US). Wall Street Journal. ISSN 0099-9660. https://www.wsj.com/articles/SB123914805204099085.
- ↑ "Google cyber attack hit password system" The New York Times, Reuters, April 19, 2010.
- ↑ Goodin, Dan (May 21, 2013). "Chinese hackers who breached Google reportedly targeted classified data". https://arstechnica.com/security/2013/05/chinese-hackers-who-breached-google-reportedly-targeted-classified-data/.
- ↑ Jacobs, Andrew; Helft, Miguel (January 12, 2010). "Google, Citing Attack, Threatens to Exit China". The New York Times. https://www.nytimes.com/2010/01/13/world/asia/13beijing.html?_r=1.
- ↑ Zetter, Kim (January 13, 2010). "Google Hackers Targeted Source Code of More Than 30 Companies". Wired. https://www.wired.com/threatlevel/2010/01/google-hack-attack. Retrieved November 1, 2010.
- ↑ "US embassy cables: China uses access to Microsoft source code to help plot cyber warfare, US fears". The Guardian (London). December 4, 2010. https://www.theguardian.com/world/us-embassy-cables-documents/214462?INTCMP=SRCH.
- ↑ Riley, Michael, and Dune Lawrence, "Hackers Linked to China’s Army Seen From EU to D.C. ", Bloomberg L.P., 27 July 2012
- ↑ "China's Response to BusinessWeek". BusinessWeek. April 10, 2008. http://www.businessweek.com/stories/2008-04-09/chinas-response-to-businessweek.
- ↑ Zetter, Kim (January 25, 2010). "China Accuses US of Cyberwarfare". Wired. https://www.wired.com/threatlevel/2010/01/china-accuses-us/.
- ↑ Nakashima, Ellen, "Report on ‘Operation Shady RAT’ identifies widespread cyber-spying ", The Washington Post , August 3, 2011.
- ↑ Anderlini, Jamil (January 15, 2010). "The Chinese dissident's 'unknown visitors'". Financial Times. http://www.ft.com/cms/s/0/c590cdd0-016a-11df-8c54-00144feabdc0.html.
- ↑ Barnes, Julian E. (March 4, 2008). "China's computer hacking worries Pentagon". Los Angeles Times. http://www.latimes.com/news/nationworld/world/la-fg-uschina4mar04,1,3559963.story.
- ↑ Brookes, Peter (March 13, 2008). "Flashpoint: The Cyber Challenge: Cyber attacks are growing in number and sophistication". Family Security Matters. http://www.familysecuritymatters.org/homeland.php?id=1386912.
- ↑ "The U.S. Presses on Cyberthreats; In Beijing, Treasury Secretary Frames Issue as a Top Priority in Ties With China". March 20, 2013 The Wall Street Journal
- ↑ Finkle, J., Menn, J., Viswanatha, J. "U.S. accuses China of cyber spying on American companies". Reuters, May 19, 2014.
- ↑ Clayton, M. "US indicts five in China's secret 'Unit 61398' for cyber-spying". Christian Science Monitor, May 19, 2014
- ↑ Chinese hacked U.S. military contractors, Senate panel finds September 18, 2014 Reuters
- ↑ FBI warns U.S. businesses of cyber attacks, blames Beijing October 16, 2014 Reuters
- ↑ Peterson, Andrea (2015-09-24). "OPM says 5.6 million fingerprints stolen in the biggest cyber attack in US history. America doesn't have anything together this is why this happened". Independent. https://www.independent.co.uk/news/world/americas/opm-says-56-million-fingerprints-stolen-in-biggest-cyber-attack-in-us-history-10515256.html.
- ↑ Sanders, Sam (4 June 2015). "Massive Data Breach Puts 4 Million Federal Employees' Records At Risk". NPR. https://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-employees-records-at-risk.
- ↑ "Hacks of OPM databases compromised 22.1 million people, federal authorities say ". The Washington Post. July 9, 2015.
- ↑ Gordon Lubold; Dustin Volz (March 12, 2019). "Navy, Industry Partners Are 'Under Cyber Siege' by Chinese Hackers, Review Asserts; Hacking threatens U.S.'s standing as world's leading military power, study says". https://www.wsj.com/articles/navy-industry-partners-are-under-cyber-siege-review-asserts-11552415553.
- ↑ "US charges 4 members of Chinese military with Equifax hack". February 10, 2020. https://www.cnn.com/2020/02/10/politics/equifax-chinese-military-justice-department/index.html.
- ↑ "@FBI on Twitter". https://twitter.com/fbi/status/1226896376971300865.
- ↑ "China, Caught Meddling in Past Two US Elections, Claims 'Not Interested' in 2020 Vote". Voice of America. 30 April 2020. https://www.voanews.com/east-asia-pacific/china-caught-meddling-past-two-us-elections-claims-not-interested-2020-vote.
- ↑ Barnes, Julian E. (2021-03-16). "Russian Interference in 2020 Included Influencing Trump Associates, Report Says" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/2021/03/16/us/politics/election-interference-russia-2020-assessment.html.
- ↑ "Suspected Chinese hackers spied on U.S., European targets" (in en-us). 2021-04-20. https://www.pbs.org/newshour/world/suspected-chinese-hackers-spied-on-u-s-european-targets.
- ↑ "China-linked hackers used VPN flaw to target U.S. defense industry -researchers" (in en-US). https://in.finance.yahoo.com/news/china-linked-hackers-used-pulse-141437468.html.
- ↑ Miller, Maggie (2021-04-20). "Multiple agencies breached by hackers using Pulse Secure vulnerabilities" (in en). https://thehill.com/policy/cybersecurity/549326-multiple-agencies-breached-by-hackers-using-pulse-secure-vulnerabilities.
- ↑ "China-linked hackers used VPN flaw to target U.S. defense industry -researchers". 2021-04-20. https://www.reuters.com/technology/china-linked-hackers-used-pulse-secure-flaw-target-us-defense-industry-2021-04-20/.
- ↑ Siddiqui, Zeba; Bing, Christopher; Bing, Christopher (2023-05-25). "Chinese hackers spying on US critical infrastructure, Western intelligence says" (in en). Reuters. https://www.reuters.com/technology/microsoft-says-china-backed-hacker-targeted-critical-us-infrastructure-2023-05-24/.
- ↑ Sanger, David E.; Barnes, Julian E. (2023-07-29). "U.S. Hunts Chinese Malware That Could Disrupt American Military Operations" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/2023/07/29/us/politics/china-malware-us-military-bases-taiwan.html.
- ↑ Nakashima, Ellen; Menn, Joseph (2023-12-12). "China's cyber army is invading critical U.S. services" (in en-US). The Washington Post. ISSN 0190-8286. https://www.washingtonpost.com/technology/2023/12/11/china-hacking-hawaii-pacific-taiwan-conflict/.
- ↑ Greenberg, Andy. "Chinese Hackers Have Pillaged Taiwan's Semiconductor Industry". http://www.mohrss.gov.cn/SYrlzyhshbzb/dongtaixinwen/buneiyaowen/201605/t20160530_240967.html.
- ↑ Tucker, Maxim (2022-04-01). "China accused of hacking Ukraine days before Russian invasion" (in en). The Times. ISSN 0140-0460. https://www.thetimes.co.uk/article/china-cyberattack-ukraine-z9gfkbmgf.
- ↑ "Mystery of alleged Chinese hack on eve of Ukraine invasion" (in en-GB). BBC News. 2022-04-07. https://www.bbc.com/news/technology-60983346.
- ↑ Milmo, Dan (2023-05-25). "GCHQ warns of fresh threat from Chinese state-sponsored hackers" (in en-GB). The Guardian. ISSN 0261-3077. https://www.theguardian.com/technology/2023/may/25/experts-warn-against-china-sponsored-cyber-attacks-on-uk-networks.
- ↑ "The Vatican Is Said to Be Hacked From China Before Talks With Beijing" . The New York Times.
- ↑ Wolf, Jim (November 19, 2010). "Pentagon says "aware" of China Internet rerouting". Reuters. https://www.reuters.com/article/idUSTRE6AI4HJ20101119.
Original source: https://en.wikipedia.org/wiki/Cyberwarfare by China.
Read more |