<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:spies among us &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/spies-among-us/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/spies-among-us/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Mon, 25 Mar 2024 12:39:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:spies among us &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/spies-among-us/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>China had &#8220;persistent&#8221; access to U.S. critical infrastructure</title>
		<link>https://globalsecurityreview.com/u-s-army-intelligence-analyst-arrested-and-charged-with-conspiracy-to-obtain-and-disclose-national-defense-information-export-control-violations-and-bribery/</link>
					<comments>https://globalsecurityreview.com/u-s-army-intelligence-analyst-arrested-and-charged-with-conspiracy-to-obtain-and-disclose-national-defense-information-export-control-violations-and-bribery/#respond</comments>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Mon, 25 Mar 2024 12:43:08 +0000</pubDate>
				<category><![CDATA[Meet the Spies]]></category>
		<category><![CDATA[bad actors]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[spies among us]]></category>
		<category><![CDATA[spy]]></category>
		<category><![CDATA[unauthorized disclosure]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=27355</guid>

					<description><![CDATA[<p>China-backed hackers have had access to some major U.S. critical infrastructure for &#8220;at least five years,&#8221; according to an intelligence advisory released Wednesday. Why it matters: The hacking campaign laid out in the report marks a sharp escalation in China&#8217;s willingness to seize U.S. infrastructure — going beyond the typical effort to steal state secrets. The advisory provides the fullest picture [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/u-s-army-intelligence-analyst-arrested-and-charged-with-conspiracy-to-obtain-and-disclose-national-defense-information-export-control-violations-and-bribery/">China had &#8220;persistent&#8221; access to U.S. critical infrastructure</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>China-backed <a class="gtmContentClick" href="https://www.axios.com/2024/01/31/china-cyber-threats-congressional-hearing" target="_self" data-vars-link-text="hackers" data-vars-click-url="https://www.axios.com/2024/01/31/china-cyber-threats-congressional-hearing" data-vars-content-id="1cb93f13-a424-4321-b124-28434c8e3537" data-vars-headline="China had &quot;persistent&quot; access to U.S. critical infrastructure" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link" rel="noopener">hackers</a> have had access to some major U.S. critical infrastructure for &#8220;at least five years,&#8221; according to an intelligence advisory <a class="gtmContentClick" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a" target="_blank" rel="noopener" data-vars-link-text="released" data-vars-click-url="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a" data-vars-content-id="1cb93f13-a424-4321-b124-28434c8e3537" data-vars-headline="China had &quot;persistent&quot; access to U.S. critical infrastructure" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link">released</a> Wednesday.</p>
<p><strong>Why it matters:</strong> The hacking campaign laid out in the report marks a sharp escalation in China&#8217;s willingness to seize U.S. infrastructure — going beyond the typical effort to <a class="gtmContentClick" href="https://www.axios.com/2020/02/05/china-spy-agencies" target="_self" data-vars-link-text="steal state secrets" data-vars-click-url="https://www.axios.com/2020/02/05/china-spy-agencies" data-vars-content-id="1cb93f13-a424-4321-b124-28434c8e3537" data-vars-headline="China had &quot;persistent&quot; access to U.S. critical infrastructure" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link" rel="noopener">steal state secrets</a>.</p>
<ul>
<li>The advisory provides the fullest picture to-date of how a key China hacking group has gained and maintained access to some U.S. critical infrastructure.</li>
</ul>
<p><strong>Details:</strong> The U.S. Cybersecurity and Infrastructure Security Agency, the National Security Agency and the Federal Bureau of Investigation released an <a class="gtmContentClick" href="https://www.cisa.gov/sites/default/files/2024-02/aa24-038a-jcsa-prc-state-sponsored-actors-compromise-us-critical-infrastructure.pdf" target="_blank" rel="noopener" data-vars-link-text="advisory" data-vars-click-url="https://www.cisa.gov/sites/default/files/2024-02/aa24-038a-jcsa-prc-state-sponsored-actors-compromise-us-critical-infrastructure.pdf" data-vars-content-id="1cb93f13-a424-4321-b124-28434c8e3537" data-vars-headline="China had &quot;persistent&quot; access to U.S. critical infrastructure" data-vars-event-category="story" data-vars-sub-category="story" data-vars-item="in_content_link">advisory</a> Wednesday to warn critical infrastructure operators about China&#8217;s ongoing hacking interests.</p>
<ul>
<li>According to the advisory, China-backed hacking group Volt Typhoon has been exploiting vulnerabilities in routers, firewalls and VPNs to target water, transportation, energy and communications systems across the country.</li>
<li>The group has relied heavily on stolen administrator credentials to maintain access to the systems — and in some cases it has maintained access for &#8220;at least five years,&#8221; per the advisory.</li>
<li>Volt Typhoon has been seen controlling some victims&#8217; surveillance camera systems, and its access could have allowed the group to disrupt critical energy and water controls.</li>
</ul>
<p><strong>Of note: </strong>Volt Typhoon uses so-called &#8220;living off the land&#8221; techniques that limit any trace of their activities on a network — making the actors more difficult to detect.</p>
<p><a href="https://www.axios.com/2024/02/07/china-volt-typhoon-critical-cyberattacks">READ MORE</a></p>
<p><a href="https://globalsecurityreview.com/u-s-army-intelligence-analyst-arrested-and-charged-with-conspiracy-to-obtain-and-disclose-national-defense-information-export-control-violations-and-bribery/">China had &#8220;persistent&#8221; access to U.S. critical infrastructure</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/u-s-army-intelligence-analyst-arrested-and-charged-with-conspiracy-to-obtain-and-disclose-national-defense-information-export-control-violations-and-bribery/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
