Chinese hackers are positioning themselves within U.S. critical infrastructure IT networks to gain an advantage in case of major conflict, a top U.S. cybersecurity official revealed Friday, emphasizing escalating cyber threats from Beijing.
Chinese Hackers Establishing a Foothold in U.S. Critical Infrastructure
According to a senior American cybersecurity officer, Chinese hackers are preparing for a possible confrontation by establishing themselves in IT networks supporting the United States' critical infrastructure, Reuters reports.
The goal of cyber activities linked to China, according to U.S. Cyber Command director and executive Morgan Adamski, is to obtain an advantage in the event of a significant confrontation between the two countries.
Hackers with ties to China have breached IT networks and are planning disruptive assaults, according to officials.
Largest Telecom Hack in U.S. History Tied to China
At the Arlington, Virginia-based Cyberwarcon security conference, Adamski addressed a group of researchers. According to U.S. Senator Mark Warner, the greatest telecom hack in U.S. history occurred on Thursday when hackers allegedly linked to China breached U.S. telecom companies.
Per Yahoo Finance, the Federal Bureau of Investigations (FBI) recently announced that a cyber espionage operation codenamed "Salt Typhoon" had compromised the communications of high-ranking officials from the two main U.S. presidential campaigns leading up to the November 5th election, as well as telecommunications data pertaining to requests made by U.S. law enforcement.
U.S. Cyber Defenses Coordinated Against Chinese Operations
According to the bureau, possible targets are receiving technical support and information from the FBI and the Cybersecurity and Infrastructure Security Agency.
Adamski said on Friday that the U.S. government has "executed globally synchronized activities, both offensively and defensively minded, that are laser-focused on degrading and disrupting PRC cyber operations worldwide."
China Denies Involvement in Cyber Attacks
Adamski mentioned that several countries' involvement has been utilized in public examples such as exposing activities, sanctions, indictments, law-enforcement actions, and cybersecurity alerts.
Regularly, Beijing denies that it has conducted cyber operations against American companies. A request for comment was not promptly addressed by the Chinese Embassy in Washington.


Nintendo Share Sale: MUFG and Bank of Kyoto to Sell Stakes in Strategic Unwinding
U.S. Deploys Tomahawks, B-2 Bombers, F-35 Jets and AI Tools in Operation Epic Fury Against Iran
AWS Data Center in UAE Hit by Fire After Objects Strike Facility Amid Regional Tensions
OpenAI Pentagon AI Contract Adds Safeguards Amid Anthropic Dispute
Trump Warns Iran as Gulf Conflict Disrupts Oil Markets and Global Trade
UK Accepts U.S. Request to Use British Bases for Defensive Strikes on Iranian Missiles
Pentagon Weighs Supply Chain Risk Designation for Anthropic Over Claude AI Use
Meta Signs Multi-Billion Dollar AI Chip Deal With Google to Power Next-Gen AI Models
Trump Launches Operation Epic Fury: U.S. Strikes on Iran Mark High-Risk Shift in Middle East
Iran Supreme Leader Ayatollah Ali Khamenei Killed in Israeli, U.S. Strikes: Reuters
AI is already creeping into election campaigns. NZ’s rules aren’t ready
Samsung and SK Hynix Shares Hit Record Highs as Nvidia Earnings Boost AI Chip Demand
Federal Judge Blocks Virginia Social Media Age Verification Law Over First Amendment Concerns
U.S. Lawmakers Question Trump’s Iran Strategy After Joint U.S.-Israeli Strikes
Russia Signals Openness to U.S. Security Guarantees for Ukraine at Geneva Peace Talks
EU Urges Maximum Restraint in Iran Conflict Amid Fears of Regional Escalation and Oil Supply Disruption
Trump Says U.S. Attacks on Iran Will Continue, Warns of More American Casualties 



