China refutes Microsoft allegations it hacked crucial US infrastructure

Read more

hina has denied allegations made by tech big Microsoft that Chinese state-sponsored hackers have been attempting to disrupt crucial communications infrastructure between the US and Asia.

Read more

On Wednesday, Microsoft issued a report accusing a Chinese nation-state hacking group referred to as “Volt Typhoon” of concentrating on crucial infrastructure within the US and Guam to hold out espionage and knowledge gathering.

Read more

In a video assertion launched on Twitter Thursday afternoon, Mao Ning, a spokeswoman for China’s Ministry of Foreign Affairs slammed Microsoft’s report, claiming that it's “a patchwork with a broken chain of evidence” and “extremely unprofessional”.

Read more

She added that it was ironic that the report was launched collectively with statements from cybersecurity businesses within the UK, Australia, Canada and New Zealand — the opposite members apart from the US of the Five Eyes intelligence alliance.

Read more

Read More

“As we all know, the Five Eyes alliance is the world’s biggest intelligence organisation, while the NSA is the world’s biggest hacking group,” mentioned Ms Mao.

Read more

“The involvement of certain companies this time shows that the US is exploring new channels of spreading disinformation besides government agencies.

Read more

“This is not the first time for them to do so and certainly not the last time too, however, whatever subterfuge it uses, this will not change the fact that the US is the biggest hacking empire in the world.”

Read more

Volt Typhoon’s hacking marketing campaign

On Wednesday, the NSA released an advisory offering technical particulars on simply how Volt Typhoon is spying on crucial infrastructure and what organisations ought to do to stop additional assaults.

Read more

The hacking group’s espionage and information-gathering efforts reportedly affected a number of authorities programs, in addition to networks in a number of industries like communications, IT, manufacturing, utility, transportation, building and maritime.

Read more

Microsoft mentioned that Volt Typhoon was utilizing a sort of hacking technique often called “living off the land”, the place the hackers had been sneakily utilizing community administation instruments to gather credentials from native and community programs, after which use them to log in and observe the networks.

Read more

The tech big added that the hacking group had been in a position to mix into regular community exercise by routing site visitors by compromised small workplace and residential workplace (SOHO) community gear, together with routers, firewalls, and VPN {hardware}.

Read more

UK organisations urged to take motion

On Wednesday night time, the National Cyber Security Centre issued advice for UK organisations on the Volt Typhoon hacking group.

Read more

“It is vital that operators of critical national infrastructure take action to prevent attackers hiding on their systems, as described in this joint advisory with our international partners,” mentioned NCSC Director of Operations Paul Chichester.

Read more

“We strongly encourage providers of UK essential services to follow our guidance to help detect this malicious activity and prevent persistent compromise.”

Read more

William Hutchison, the previous cybersecurity lead for the US Department of Defense (DoD) informed The Standard that the UK wants to enhance its cyber defences.

Read more

“There’s been a massive underinvestment in critical national infrastructure in the UK. Unfortunately, it’s not hard to compromise critical infrastructure and bring critical services to their knees,” mentioned Mr Hutchison, who can also be chief government of cybersecurity agency SimSpace.

Read more

He desires corporations and organisations to organize themselves by simulating an actual cyberattack scenario and assessing whether or not their present responses are sufficient.

Read more

Mr Hutchison added: “By utilising military-grade cybersecurity readiness solutions, such as cyber ranges, organisations can test their systems to failure in a high-fidelity, simulated environment, shifting the power away from hackers’ intent on exfiltrating sensitive data and damaging business-critical systems.”

Read more

Did you like this story?

Please share by clicking this button!

Visit our site and see all other available articles!

UK 247 News