Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Tim Cook could step down as Apple CEO next year

    Tim Cook could step down as Apple CEO next year

    November 15, 2025
    The Razer Blade 14 Is Still One of the Best Compact Gaming Laptops

    The Razer Blade 14 Is Still One of the Best Compact Gaming Laptops

    November 15, 2025
    The Steam Machine feels like the TV gaming PC I’ve always wanted

    The Steam Machine feels like the TV gaming PC I’ve always wanted

    November 15, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » The NSA Seems Pretty Stressed About the Threat of Chinese Hackers in US Critical Infrastructure
    Security

    The NSA Seems Pretty Stressed About the Threat of Chinese Hackers in US Critical Infrastructure

    News RoomBy News RoomDecember 1, 20233 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    The NSA Seems Pretty Stressed About the Threat of Chinese Hackers in US Critical Infrastructure

    The United States National Security Agency is often tight-lipped about its work and intelligence. But at the Cyberwarcon security conference in Washington DC on Thursday, two members of the agency’s Cybersecurity Collaboration Center had a “call to action” for the cybersecurity community: Beware the threat of Chinese government-backed hackers embedding in US critical infrastructure.

    Alongside its “Five Eyes” intelligence alliance counterparts, the NSA has been warning since May that a Beijing-sponsored group known as Volt Typhoon has been targeting critical infrastructure networks, including power grids, as part of its activity.

    Officials emphasized on Thursday that network administrators and security teams need to be on the lookout for suspicious activity in which hackers manipulate and misuse legitimate tools rather than malware—an approach known as “living off the land”—to carry out clandestine operations. They added that the Chinese government also develops novel intrusion techniques and malware, thanks to a substantial stockpile of zero-day vulnerabilities that hackers can weaponize and exploit. Beijing collects these bugs through its own research, as well as a law that requires vulnerability disclosure.

    The People’s Republic of China “works to gain unauthorized access to systems and wait for the best time to exploit these networks,” Morgan Adamski, director of the NSA’s Cybersecurity Collaboration Center, said on Thursday. “The threat is extremely sophisticated and pervasive. It is not easy to find. It is pre-positioning with intent to quietly burrow into critical networks for the long haul. The fact that these actors are in critical infrastructure is unacceptable, and it is something that we are taking very seriously—something that we are concerned about.”

    Microsoft’s Mark Parsons and Judy Ng gave an update on Volt Typhoon’s activity later in the day at Cyberwarcon. They noted that after seemingly becoming dormant in the spring and most of the summer, the group reappeared in August with improved operational security to make its activity more difficult to track. Volt Typhoon has continued attacking universities and US Army Reserve Officers’ Training Corps programs—a type of victim the group particularly favors—but it has also been observed targeting additional US utility companies.

    “We think Volt Typhoon is doing this for espionage-related activity, but in addition, we think there’s an element that they could use it for destruction or disruption in a time of need,” Microsoft’s Ng said on Thursday.

    The NSA’s Adamski and Josh Zaritsky, chief operations officer of the Cybersecurity Collaboration Center, urged network defenders to manage and audit their system logs for anomalous activity and store logs such that they can’t be deleted by an attacker who gains system access and is looking to hide their tracks.

    The two also emphasized best practices, like two-factor authentication and limiting users’ and admins’ system privileges to minimize the possibility that attackers can compromise and exploit accounts in the first place. And they emphasized that not only is it necessary to patch software vulnerabilities, it is crucial to then go back and check logs and records to make sure that there aren’t signs that the bug was exploited before it was patched.

    “We are going to need internet service providers, cloud providers, endpoint companies, cybersecurity companies, device manufacturers, everybody in this fight together. And this is a fight for our US critical infrastructure,” Adamski said. “The products, the services that we rely on, everything that matters—that’s why this is important.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleTesla’s Cybertruck Is Two Years Late and Still Crazy
    Next Article Omegle Was Forced to Shut Down by a Lawsuit From a Sexual Abuse Survivor

    Related Posts

    Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan

    Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan

    November 15, 2025
    The Government Shutdown Is a Ticking Cybersecurity Time Bomb

    The Government Shutdown Is a Ticking Cybersecurity Time Bomb

    November 14, 2025
    Zohran Mamdani Just Inherited the NYPD Surveillance State

    Zohran Mamdani Just Inherited the NYPD Surveillance State

    November 12, 2025
    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    November 12, 2025
    FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

    FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

    November 7, 2025
    CBP Searched a Record Number of Phones at the US Border Over the Past Year

    CBP Searched a Record Number of Phones at the US Border Over the Past Year

    November 7, 2025
    Our Picks
    The Razer Blade 14 Is Still One of the Best Compact Gaming Laptops

    The Razer Blade 14 Is Still One of the Best Compact Gaming Laptops

    November 15, 2025
    The Steam Machine feels like the TV gaming PC I’ve always wanted

    The Steam Machine feels like the TV gaming PC I’ve always wanted

    November 15, 2025
    Framework’s franken-laptop is back with big chip upgrades and familiar frustrations

    Framework’s franken-laptop is back with big chip upgrades and familiar frustrations

    November 15, 2025
    Pluribus’ third episode throws a bomb into things

    Pluribus’ third episode throws a bomb into things

    November 15, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan Security

    Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan

    By News RoomNovember 15, 2025

    When billionaire Dutch TV producer John de Mol sued Facebook in 2019 over its alleged…

    What Causes the Northern Lights?

    What Causes the Northern Lights?

    November 15, 2025
    The Meta Quest 3S is  off and comes with a  gift card and a game

    The Meta Quest 3S is $50 off and comes with a $50 gift card and a game

    November 14, 2025
    The Government Shutdown Is a Ticking Cybersecurity Time Bomb

    The Government Shutdown Is a Ticking Cybersecurity Time Bomb

    November 14, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.