Senior U.S. Official: Chinese Hackers Preparing for Conflict with the United States

RKS
RKS 2 Min Read
2 Min Read

Chinese hackers are positioning themselves in the critical cybersecurity infrastructure networks of the United States in preparation for a possible confrontation with Washington, a senior U.S. cybersecurity official said on Friday.

Morgan Adamski, executive director of U.S. Cyber Command, stated that Chinese-linked cyber operations are aimed at gaining an advantage in the event of a major conflict with the U.S.

Officials have warned that China-linked hackers have compromised information technology networks and taken steps to carry out cyberattacks in the event of conflict. Their activities include securing access to key networks to enable potential disruptions such as manipulating heating, ventilation, and air conditioning systems in server rooms, as well as disrupting energy and water supplies, U.S. officials said earlier this year.

Beijing has consistently denied involvement in cyber operations targeting U.S. infrastructure. The Chinese Embassy in Washington did not immediately respond to a request for comment.

Adamski was speaking to researchers at the “Cyberwarcon” security conference in Arlington, Virginia. On Thursday, U.S. Senator Mark Warner told The Washington Post that Chinese cyber intrusions into U.S. telecommunications companies are among the most significant for the U.S. sector.

The cyber espionage operation, named “Salt Typhoon,” has involved data theft, interference with the infrastructure of two U.S. presidential campaigns ahead of the November 5 elections, and intrusions into telecommunications companies that work with U.S. law enforcement, FBI officials said.

The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) are providing technical assistance and information to potential targets, according to the latest FBI statement on the matter.

Adamski said on Friday that the U.S. government has “carried out synchronized activities globally, both offensive and defensive, focused on degrading and disrupting China’s cyber operations worldwide.”

Public examples include exposing Chinese cyber operations, sanctions, indictments, law enforcement actions, and cybersecurity advisories with data from many countries, Adamski said.

Share this Post