Good morning. Incident-response and intelligence specialists at the annual RSAC in San Francisco agree that Chinese state-sponsored cyber activity has continued to ramp up this year. That's true even after the discovery of China-linked infiltration of U.S. critical infrastructure and telecom providers.
“The volume of intrusion activity that we see coming from China is really high right now,” said Charles Carmakal, chief technology officer at incident-response firm Mandiant, part of Alphabet’s Google.
U.S. officials have long warned that Chinese cyber activity had reached new highs, thanks in part to a mix of economic pressures, geopolitical tension that includes a looming conflict over Taiwan, and great-power competition.
China has also become more assertive in cyber affairs, recently blaming the U.S. for cyberattacks during the Asian Winter Games, and naming U.S. intelligence officers, mimicking a longstanding Western approach. Washington denies the accusations.
Chinese officials gave a tacit acknowledgment to their American counterparts in recent months that they were, in fact, inside U.S. critical infrastructure systems, seen as a warning about intervening in a future invasion of Taiwan.
What’s raising concern is the focus on certain infrastructure outside of presumed targets, such as New York City or other major metropolitan areas.
“The small-municipality targeting is interesting. It could be sort of exercising and getting ready from a drill perspective,” said Sam Rubin, head of Palo Alto Networks' Unit 42 incident-response business.
Also today: Read our Q&A with SolarWinds CISO Tim Brown, who discusses the mental and physical toll of fighting the Securities and Exchange Commission in court.
More news below.
|