[JACK AYLMER]
CHINESE HACKERS ARE GOING AFTER AMERICAN PROPERTY.
AND THEY’RE SHOWING NO SIGNS OF STOPPING OR SLOWING DOWN.
THE NATIONAL SECURITY AGENCY HAS SPECIFICALLY WARNED ABOUT A CHINESE HACKING GROUP CALLED VOLT TYPHOON.
THEY’VE BEEN TARGETING U.S. INFRASTRUCTURE, LIKE ELECTRIC GRID OPERATORS, WATER SYSTEMS AND SHIPPING PORTS.
IN SOME CASES, THE HACKERS CAN GET IN AND MAINTAIN ACCESS TO THE NETWORKS FOR AT LEAST FIVE YEARS.
LYING DORMANT UNTIL THEY’RE READY TO STRIKE.
[CHRISTOPHER WRAY]
China’s hackers are positioning on American infrastructure in preparation to wreak havoc and cause real world harm to American citizens and communities.
[JACK AYLMER]
THIS GIVES VOLT TYPHOON THE ABILITY TO CONDUCT POTENTIALLY DESTRUCTIVE CYBERATTACKS AT WILL.
CRIPPLING THE SERVICES EVERY DAY AMERICANS RELY ON AT A MOMENT’S NOTICE.
[CHRISTOPHER WRAY]
If and when China decides the time has come to strike, they’re not focused just on political and military targets, we can see from where they position themselves across civilian infrastructure, that low blows aren’t just a possibility in the event of a conflict, low blows against civilians are part of China’s plan. -Christopher Wray, FBI Director
[JACK AYLMER]
CHINA ISN’T UTILIZING INCREDIBLY SOPHISTICATED TECHNOLOGY TO DO THIS EITHER.
MANY OF THE TACTICS USED ARE ACTUALLY PRETTY STANDARD FOR A RELATIVELY SKILLED HACKER.
THEY’RE JUST SO PERSISTENT WITH THEIR HACKING ATTEMPTS, THAT EVENTUALLY GROUPS LIKE VOLT TYPHOON ARE ABLE TO GET IN.
THE VULNERABLE STATE OF U.S. INFRASTRUCTURE CYBERSECURITY MAKES THIS PROBLEM EVEN BIGGER.
THE LEVEL OF COORDINATION NEEDED TO COMBAT THESE ATTACKS JUST DOESN’T EXIST.
TAKE THE U.S. WATER SYSTEM FOR EXAMPLE.
IT HAS AT LEAST 150,000 INDIVIDUAL OPERATIONS, EACH RUN BY DIFFERENT ENTITIES AND INDIVIDUALS.
THAT LEVEL OF FRAGMENTATION EXISTS THROUGHOUT ALL 16 CRITICAL INFRASTRUCTURE SECTORS IN THE COUNTRY.
FEDERAL AGENCIES ARE NOW ADVISING OPERATORS ON BEST PRACTICES TO PREVENT THESE CYBERSECURITY BREACHES IN THE FUTURE.
THEY SAY THAT IMPLEMENTING MULTI FACTOR AUTHENTICATION AND REGULARLY REVIEWING NETWORK ACTIVITY LOGS CAN HELP STOP PERSISTENT CHINESE HACKERS FROM GETTING THROUGH.