China again claims Volt Typhoon cyber-attack crew was invented by the US to discredit it


Chinese authorities have published another set of allegations that assert the Volt Typhoon cyber-crew is an invention of the US and its allies, and not a crew run by Beijing.

Published on Monday in five languages, a document titled “Lie to Me: Volt Typhoon III – Unravelling Cyberespionage and Disinformation Operations Conducted by US Government Agencies” largely revisits the content of a similar document published in July. Volt Typhoon is accused by Five Eyes nations of being a Beijing-backed team that targets American networks and critical infrastructure.

Read more…
Source: The Register


Sign up for our Newsletter


Related:

  • US sanctions Chinese cybersecurity firm for firewall hacks targeting critical infrastructure

    December 10, 2024

    The U.S. sanctioned a Chinese cybersecurity company and one of its employees for exploiting a zero-day vulnerability in Sophos firewalls to target U.S. organizations. On Tuesday, the U.S. Treasury Department said Guan Tianfeng, an employee of Sichuan Silence, used the vulnerability to compromise approximately 81,000 firewalls in April 2020. The hacking campaign, detailed by Sophos in ...

  • What is high bandwidth memory and why is the US trying to block China’s access to it?

    December 8, 2024

    The US government has imposed fresh export controls on the sale of high tech memory chips used in artificial intelligence (AI) applications to China. The rules apply to US-made high bandwidth memory (HBM) technology as well as foreign-produced ones. High bandwidth memory (HBM) are basically a stack of memory chips, small components that store data. They ...

  • US critical infrastructure hit once again by a new group on the scene

    December 6, 2024

    Storm-0227, a Chinese state-sponsored advanced persistent threat (APT) actor started targeting critical infrastructure organizations, as well as government entities, in the United States. The group abuses software vulnerabilities and engages in spear phishing attacks to gain access to people’s devices. Once they get the access, they deploy different Remote Access Trojans (RAT) and other malware to ...

  • MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks

    December 5, 2024

    Trend Micro researchers have been continuously monitoring the MOONSHINE exploit kit’s activity since 2019. During our research, they discovered a MOONSHINE exploit kit server with improper operational security: Its server exposed MOONSHINE’s toolkits and operation logs, which revealed the information of possible victims and the attack tactics of a threat actor we have named Earth ...

  • Senators say US military is failing to secure its phones from foreign spies

    December 4, 2024

    Two U.S. senators are accusing the Department of Defense (DOD) of not doing enough to protect the communications of its military personnel, as the U.S. government contends with an ongoing Chinese hacking campaign targeting American phone and internet giants. The senators say the Department of Defense still relies too heavily on old-fashioned landline calls, and unencrypted ...

  • Foreign espionage agencies exploit crowdsourcing for covert intelligence gathering in China

    December 4, 2024

    China’s Ministry of State Security revealed on Wednesday that foreign intelligence agencies are using crowdsourcing to gather sensitive data in China, posing a covert but serious threat to national security. This covert method, dubbed “crowdsourced espionage,” poses an escalating threat. Foreign intelligence agencies break down intelligence-gathering missions into smaller, discrete tasks and distribute them via legitimate ...