Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
China Microsoft

Microsoft Warns That China Hackers Attacked US Infrastructure (cnbc.com) 39

Microsoft has issued a warning that Chinese state-sponsored hackers, known as "Volt Typhoon," have compromised "critical" U.S. cyber infrastructure across various industries with a focus on gathering intelligence. CNBC reports: The Chinese hacking group, codenamed "Volt Typhoon," has operated since mid-2021, Microsoft said in an advisory. The organization is apparently working to disrupt "critical communications infrastructure between the United States and Asia," Microsoft said, to stymie efforts during "future crises." The National Security Agency put out a bulletin (PDF) on Wednesday, detailing how the hack works and how cybersecurity teams should respond.

The attack is apparently ongoing. In an advisory, Microsoft urged impacted customers to "close or change credentials for all compromised accounts." U.S. intelligence agencies became aware of the incursion in February, around the same time that a Chinese spy balloon was downed, the New York Times reported. The infiltration was focused on communications infrastructure in Guam and other parts of the U.S., the Times reported, and was particularly alarming to U.S. intelligence because Guam sits at the heart of an American military response in case of a Taiwanese invasion.

Volt Typhoon is able to infiltrate organizations using a unnamed vulnerability in a popular cybersecurity suite called FortiGuard, Microsoft said. Once the hacking group has gained access to a corporate system, it steals user credentials from the security suite and uses them to try to gain access to other corporate systems. The state-sponsored hackers aren't looking to create disruption yet, Microsoft said. Rather, "the threat actor intends to perform espionage and maintain access without being detected for as long as possible." Infrastructure in nearly every critical sector has been impacted, Microsoft said, including the communications, transport, and maritime industries. Government organizations were also targeted.

This discussion has been archived. No new comments can be posted.

Microsoft Warns That China Hackers Attacked US Infrastructure

Comments Filter:
  • by Bahbus ( 1180627 )

    I can't imagine how popular this FortiGuard actually is as this is the first I'm hearing of them, and I've never seen their company show up for anti-virus test comparisons. Their name invokes thoughts of how a child might name something, and immediately gives me the impression that it's probably not the best product on the market. So, I highly doubt it's actually a popular product and moreso the lowest quoted security product, and the government is fucking lazy and stupid when it comes to software purchases

    • Right, so what you can almost certainly guarantee about FortiGuard based on all of that is that it's almost ubiquitously used across all the most sensitive branches of government and the decision was made behind closed doors with absolutely no accountability or public review process.

      • Oh, yea, and you can also count on it having cost literally billions of dollars but is functionally less capable than a 3-line shell script.

        • Oh, you're so clever. "I could do that in 3 lines of bash, hrr hrr"
          • Yes, I'm actually that guy; the guy they're all afraid will replace them with a shell script, because I actually can. Some fun fact about shell scripts: They work for free, they don't need sick days, and they don't have massive inferiority complexes.

            • Oh, for sure.
              I just can't figure out why we haven't hired you to handle our PCI+DSS/SOC2 yet.
              3 lines of bash- what can't you do with that kind of power?
    • Software generally reads all care, no responsibility. Execs just scan some magic square report and make the buying decisions on the basis of buzzwords. The simple answer is to ditch vendors who have lousy security and a bad record of high sev vulns. And if some bad actor targets this inherently unworthy software, the clowns stuck on it - have contributory negligence. About time any so called cyber insurance policies start naming duff products.
    • Fortigate is a customer of mine, actually. Have been for over a decade.

      We'd be a customer of theirs, but we're an open source shop wherever possible.
      Now, here's where it gets tricky.
      When you're trying to get all your dumb fucking PCI-DSS/SOC2 shit, you really do need to have independent firewalls in front of every single domain.
      These firewalls need to have more than just protective rules, they need IDS and IPS.
      Organizations as such look for packaged solutions (FortiGates, WatchGuards, NetScreens, PIX,
  • by poet ( 8021 )

    No Sh!t! department?

  • "China hackers"? Is the orange menace writing CNBC headlines? ChatGPT? Is CNBC struggling to hire literate writers? "Business news" sources do attract the dumbest people.

    Neither MS nor CCP will ever disclose the lengths of US espionage. MS because of US laws, and CCP because it cannot reveal weakness.

    There is no news here. Move along.
    • by xwin ( 848234 )
      China also accuses US of cyberattacks https://www.npr.org/2021/07/20... [npr.org] . Both countries do the same thing against one another. US is attacking and spying on everyone including its allies. There is no "good guys" there, unless you consider anything that your country does good.
      I do not read mandarin but I am sure in the Chinese press there are multiple accusations against the US.
    • But the USA is a democratic republic with freedom. We aren't a dictatorship with no checks and balances like China
  • by marquis111 ( 94760 ) on Wednesday May 24, 2023 @05:19PM (#63548921)

    IMHO, the wording of this article is bound to cause misunderstanding. Fortiguard is a threat intelligence service and security research arm of Fortinet. Fortinet devices pull info FROM Fortiguard and use them in policies, but I'm not sure why they call Fortiguard a "popular cybersecurity suite". Everything I've read so far suggests that Volt Typhoon is targeting misconfigured internet-facing SOHO devices, including Fortigates, but maybe there is more info to come.

  • "the threat actor intends to perform espionage and maintain access without being detected for as long as possible."

    That's speculation and since you've just announced it to everyone out there, I think they know they've been exposed.
    what's missing here is how many times Fortinet has been hacked. Here's a recent story [arstechnica.com]

    For me, if the vendor's products are getting hacked this frequently [duckduckgo.com] then their equipment/software and their annual license fees go in the dumpster.

  • This makes me wonder something similar to UL is needed that would not just do black box testing, but as part of the agreement, take the source code of the version to be certified, run tools on that [1], then do a build and see how that compared to the artifact that the company wants to certify. For hardware, if it require secret sauce, then use a CPU simulator or FPGA boards, and the firmware run against that, or a similar SBC.

    From there, do like Europe's "Sold Secure", with silver/gold/platinum, where the

  • Sounds like one to me. Though yeah, probably better just to sit back and let them do their thing. It's worked so well with The ruzzia after all.

  • If the west really wants to stop China, we could. Problem is, that only 1 nation is doing it, and that is Estonia.
    They have implemented Digital Certificates for all of their citizens so that they KNOW who they are dealing with.
    Why will the rest of the west not do it? Because it will make it harder to see what we write, talk, etc.
    Stupid thing is that terrorist and most criminals ALREADY DO THIS.
  • Without asking for identity cards and motives through the pixels, where is the evidence?

    Mandarin characters and particular IP addresses aren't proof of a grand conspiracy.

    Could be anyone, including a non-state actor, or any state posing as Chinese to strain relations with the West even more.

    It could also be people in China who have no official policy goals or appearing to hack from there for organized crime reasons.

    Reading motive and origin from malware is a leap too far. Claim only what is known but claim

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...