Tag Archive for: raising

Chinese Hackers Target American Infrastructure, Raising Concerns of Cyber Warfare


According to U.S. officials and security experts, hackers affiliated with China’s People’s Liberation Army have been infiltrating the computer systems of critical American entities in an effort to disrupt key infrastructure. Over the past year, about two dozen entities have fallen victim to these cyber intrusions, including a water utility in Hawaii, a major West Coast port, and at least one oil and gas pipeline. Their targets also included the operator of Texas’s power grid. It appears that the Chinese military aims to sow chaos and panic or obstruct logistics in the event of a conflict between the U.S. and China in the Pacific.

While the intrusions did not cause any disruptions or impact industrial control systems, it is evident that China wants to complicate U.S. efforts to deploy troops and equipment to the Pacific region. The Chinese military intends to gain the ability to disrupt critical infrastructure and affect decision-making during a crisis. This marks a significant shift from their previous cyber activities focused on political and economic espionage.

The cyber campaign, known as Volt Typhoon, was first detected the U.S. government about a year ago. It targets entities within the Indo-Pacific region, particularly Hawaii. The hackers often disguise their tracks utilizing innocuous devices like home or office routers. Their primary objective is to steal employee credentials that can be used to maintain persistent access.

The revelations concerning China’s cyber warfare capabilities confirm the fears expressed in the annual threat assessment the Office of the Director of National Intelligence. The assessment warned that China is capable of launching cyberattacks that could disrupt critical U.S. infrastructure. In the face of a possible conflict, China would not hesitate to conduct aggressive cyber operations against U.S. assets worldwide.

The victims of Volt Typhoon include smaller companies and organizations across various sectors. It is believed that these entities were opportunistically targeted in the hopes of gaining access to larger, more critical customers through their supply chains.

Chinese military officers have outlined the use of cyber tools and network…

Source…

Jake Sullivan served on a national security board with Hunter Biden for 2 years, raising questions from GOP


Hunter Biden and President Biden’s national security adviser, Jake Sullivan, served together on the board of the Truman National Security Project, a liberal foreign policy think tank, for roughly two years before Sullivan joined the president’s campaign in 2020.

Hunter, who started serving on the board in 2012, and Sullivan both served on the Washington-based nonprofit’s board between 2017 and early 2019, according to internet archives captured by the Wayback Machine. 

During that time, Hunter was also serving on the board of Ukrainian energy company Burisma Holdings and the Chinese private equity fund BHR Partners. The federal investigation into Hunter’s foreign business dealings, which is still ongoing, also launched during the same time frame in 2018. 

Prior to joining the Truman National Security Project, Sullivan served as then-Vice President Biden’s national security adviser in the Obama administration, where he traveled to multiple countries with the elder Biden, including China. 

A video from the Obama administration’s archived website shows Sullivan was on the same infamous Asia trip where Hunter Biden and his daughter accompanied then-Vice President Biden on Air Force Two. During the China portion of the trip, Hunter arranged a brief handshake in the U.S. delegation’s hotel lobby between his father and Jonathan Li, Hunter’s Chinese business partner who ran the Chinese private-equity fund Bohai Capital. Less than two weeks after Biden arrived in China, BHR Partners was registered.

HUNTER BIDEN’S BUSINESS PARTNERS, ASSISTANTS VISITED WHITE HOUSE OVER 80 TIMES WHEN BIDEN WAS VP

Jake Sullivan and HUNTER BIDEN

President Biden’s National Security Adviser Jake Sullivan (Left) and Hunter Biden (Right) (Getty Images)

Sullivan also had multiple roles with Hillary Clinton, including chief foreign policy adviser during her failed 2016 presidential campaign and deputy chief of staff when she was secretary of state, where he traveled to 112 countries with her.

During the Clinton campaign, Sullivan notoriously pushed the Trump-Russia collusion narrative to reporters. He told members of the House Intelligence committee in a December 2017 interview that prior to the 2016 election he briefed reporters on his…

Source…

Hackers are waging a guerrilla war on tech companies, revealing secrets and raising fears of collateral damage


A chain of recent, devastating hacks is exposing some of the Internet’s most fiercely guarded secrets, stepping up a guerrilla struggle between tech firms and anonymous hackers and raising fears that everyday Internet users could get caught in the crossfire.



An advertising board for Twitch during the 2016 Electronic Entertainment Expo video game conference in Los Angeles. (Photo by Frederic J. Brown / AFP via Getty Images)


© Frederic J. Brown/AFP/Getty Images
An advertising board for Twitch during the 2016 Electronic Entertainment Expo video game conference in Los Angeles. (Photo by Frederic J. Brown / AFP via Getty Images)

Hackers this week dumped a colossal haul of data stolen from Twitch, the Amazon-owned streaming site, revealing what they said was not just the million-dollar payouts for its most popular video game streamers but the site’s entire source code — the DNA, written over a decade, central to keeping the company alive.

Loading...

Load Error

That followed the hack by the group Anonymous that exposed the most crucial inner workings of Epik, an Internet services company popular with the far right, and triggered firings and other consequences for some of the company’s clients whose identities had previously been undisclosed.

The Epik hack also made way for breaches into the websites of the Texas GOP, one of America’s biggest state party affiliates, and the Oath Keepers, a far-right militia group that contributed to the storming of the U.S. Capitol on Jan. 6. A California sheriff faced calls for his resignation this week after the hack showed evidence that he had been a member of the group in 2014.

The perpetrators of these hacks are distancing themselves from financially driven cybercriminals and ransomware gangs by portraying their attacks as moral crusades against what they said were the companies’ sins. In celebratory notes released alongside their data dumps, the Epik hackers said they were sick of the company serving hateful websites, while the Twitch hackers used a hashtag criticizing company efforts to confront harassment and said the site had become a “disgusting cesspool.”

“Jeff Bezos paid $970 million for this,” the hackers wrote, referring to the price Amazon paid to buy the company in 2014. “We’re giving it away FOR FREE.” (Bezos, Amazon’s founder, owns The Washington…

Source…

Google exposes nine-month counter-terror hacking op by ‘friendly’ government, raising questions about what makes an ally — RT World News


A Google hacking team has exposed — and shut down — an expert counterterrorism hacking operation by a supposed US ally. While the report hid most details, it raised troubling questions on what constitutes an ally in cyberspace.

The tech giant’s Project Zero and Threat Analysis Group hacking teams uncovered and ultimately put an end to a counter-terrorism operation being run by a US ally, according to MIT Tech Review, which detailed the internal struggle at Google over whether to publicize the incident and what it implied for future cyber-espionage (apparently, all’s fair in love, war, and malware attacks).

Both Project Zero, which uncovers and exposes security vulnerabilities, and Threat Analysis Group, which tracks hacks believed to be run by governments, helped take down the “friendly” malware attack, which weaponized 11 zero-day vulnerabilities in the course of nine months. A zero-day vulnerability is a flaw that the software’s creator and user are unaware exists, a security issue that can be used as a backdoor and otherwise exploited until it is discovered.

Cropping up 11 times in nine months – more frequently than a typical zero-day exploit – the attack targeted devices powered by iOS, Android, and Windows. The exploits were innovative (MIT described them as “never-before-seen techniques”) and used infected websites as “watering holes” to deliver malware to unfortunate visitors. The infection process had been ongoing since early 2020.



Also on rt.com
Google researchers reveal exploit that let hackers ‘own’ iPhones REMOTELY – but waited 6 months to tell the world


MIT revealed on Friday that the hackers running the scheme were “actually Western government operatives actively conducting a counter-terrorism operation,” an unusual revelation given that tracing hacks to state-level actors is not the easy-to-grasp, cut-and-dried operation that US cybersecurity firms like CrowdStrike and FireEye like to describe when they speak with reporters. 

Indeed, while Google’s Threat Analysis Group attributes hacks to states, Project Zero does not, though private security companies…

Source…