www.reuters.com
Open in
urlscan Pro
2600:9000:235a:a000:15:5a3e:9d40:93a1
Public Scan
URL:
https://www.reuters.com/world/china/china-rejects-claim-it-is-spying-western-critical-infrastructure-2023-05-25/
Submission Tags: falconsandbox
Submission: On October 31 via api from US — Scanned from DE
Submission Tags: falconsandbox
Submission: On October 31 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to main content Exclusive news, data and analytics for financial market professionalsLearn more aboutRefinitiv * World Browse World * Africa * Americas * Asia Pacific * China * Europe * India * Israel and Hamas at War * Japan * Middle East * Ukraine and Russia at War * United Kingdom * United States * Reuters NEXT * US Election * Business Browse Business * Aerospace & Defense * Autos & Transportation * Davos * Energy * Environment * Finance * Healthcare & Pharmaceuticals * Media & Telecom * Retail & Consumer * Future of Health * Future of Money * Take Five * World at Work * Markets Browse Markets * Asian Markets * Carbon Markets * Commodities * Currencies * Deals * Emerging Markets * ETFs * European Markets * Funds * Global Market Data * Rates & Bonds * Stocks * U.S. Markets * Wealth * Macro Matters * Sustainability Browse Sustainability * Boards, Policy & Regulation * Climate & Energy * Land Use & Biodiversity * Society & Equity * Sustainable Finance & Reporting * The Switch * Reuters Impact * COP29 * Legal Browse Legal * Government * Legal Industry * Litigation * Transactional * US Supreme Court * Breakingviews Browse Breakingviews * Breakingviews Predictions * Technology Browse Technology * Artificial Intelligence * Cybersecurity * Space * Disrupted * More Investigations Sports * Athletics * Baseball * Basketball * Cricket * Cycling * Formula 1 * Golf * NFL * NHL * Soccer * Tennis Science Lifestyle Graphics Pictures Wider Image Podcasts Fact Check Video Sponsored Content * Reuters Plus * Press Releases My News Sign InSubscribe * China * Data Privacy * Grid & Infrastructure * Public Policy U.S. WARNS CHINA COULD HACK INFRASTRUCTURE, INCLUDING PIPELINES, RAIL SYSTEMS By Raphael Satter, Zeba Siddiqui and James Pearson May 26, 202311:05 AM GMT+2Updated a year ago Text * Small Text * Medium Text * Large Text Share * X * Facebook * Linkedin * Email * Link * Companies * Dell Technologies Inc Follow * Fortinet Inc Follow * Microsoft Corp Follow Show more companies May 25 (Reuters) - The U.S. State Department warned on Thursday that China was capable of launching cyber attacks against critical infrastructure, including oil and gas pipelines and rail systems, after researchers discovered a Chinese hacking group had been spying on such networks. A multi-nation alert issued Wednesday revealed the Chinese cyber-espionage campaign had been aimed at military and government targets in the United States. Advertisement · Scroll to continue The Chinese government has rejected assertions that its spies are going after Western targets, calling the warning issued by the United States and its allies a "collective disinformation campaign." U.S. officials said they were still in the process of getting their arms around the threat. "We’ve had at least one location that we didn’t know about since the hunt guide was released come forward with data and information," Rob Joyce, the U.S. National Security Agency's (NSA) cybersecurity director, told Reuters. The agency disclosed technical details earlier to help critical service providers detect the spying. Advertisement · Scroll to continue The U.S. Cybersecurity and Infrastructure Security Agency (CISA) separately said it was working to understand "the breadth of potential intrusions and associated impacts." That would help it "provide assistance where needed, and more effectively understand the tactics undertaken by this adversary," CISA's executive assistant director, Eric Goldstein, told Reuters. Part of the challenge in defending against this espionage work is that it's more covert than regular spy operations, according to researchers and officials. "In these cases the adversary is often using legitimate credentials and legitimate network administration tools to gain access to execute their objectives on a target network," Goldstein said. "Many traditional methods of detection, such as antivirus, will not find these intrusions." Item 1 of 2 U.S. and Chinese flags are seen in this illustration taken, January 30, 2023. REUTERS/Dado Ruvic/Illustration/File Photo [1/2]U.S. and Chinese flags are seen in this illustration taken, January 30, 2023. REUTERS/Dado Ruvic/Illustration/File Photo Purchase Licensing Rights, opens new tab Microsoft analysts who identified the campaign, which they dubbed Volt Typhoon, said it "could disrupt critical communications infrastructure between the United States and Asia region during future crises" - a nod to escalating U.S.-China tensions over Taiwan and other issues. "The U.S. intelligence community assesses that China almost certainly is capable of launching cyberattacks that could disrupt critical infrastructure services within the United States, including against oil and gas pipelines and rail systems," State Department spokesperson Matthew Miller said in a press briefing. "It's vital for government and network defenders in the public to stay vigilant." U.S. agencies have been pushing for improved cybersecurity practices in its majority-privately held critical infrastructure industry, after the 2021 hack of the key Colonial Pipeline disrupted nearly half of the U.S. East Coast’s fuel supply. Intelligence agencies in the United States, Britain and their close allies issued an alert Wednesday to warn about Volt Typhoon. Microsoft said the group had targeted critical infrastructure organizations in the U.S. Pacific territory of Guam, and it was using the security firm Fortinet's (FTNT.O), opens new tab FortiGuard devices to break into target's networks. Researcher Marc Burnard, whose organisation Secureworks has dealt with several intrusions tied to Volt Typhoon, said Secureworks had seen no evidence of destructive activity by Volt Typhoon, but that its hackers were focused on stealing information that would "shed light on U.S. military activities." NSA's Joyce said there was no doubt Volt Typhoon was putting itself in position to carry out disruptive attacks. "It’s clear that some of the entities on here are of no intelligence value," he told Reuters of the critical infrastructure sites identified by the government. Chinese foreign ministry spokesperson Mao Ning told reporters that the alerts issued by the United States, Britain, Canada, Australia and New Zealand were intended to promote their intelligence alliance - known as the Five Eyes - and it was Washington that was guilty of hacking. "The United States is the empire of hacking," Mao said. The Reuters Daily Briefing newsletter provides all the news you need to start your day. Sign up here. Additional reporting by Christopher Bing and Daphne Psaledakis; editing by William Maclean, Mark Heinrich, Chizu Nomiyama and Leslie Adler Our Standards: The Thomson Reuters Trust Principles., opens new tab Share * X * Facebook * Linkedin * Email * Link Purchase Licensing Rights Raphael Satter Thomson Reuters Reporter covering cybersecurity, surveillance, and disinformation for Reuters. Work has included investigations into state-sponsored espionage, deepfake-driven propaganda, and mercenary hacking. * Email * X * Instagram * Linkedin James Pearson Thomson Reuters Reports on hacks, leaks and digital espionage in Europe. Ten years at Reuters with previous postings in Hanoi as Bureau Chief and Seoul as Korea Correspondent. Author of 'North Korea Confidential', a book about daily life in North Korea. * Email * X * Instagram * Linkedin READ NEXT * Macro MatterscategoryChina's looming fiscal package set to stabilise rather than boost growth * Macro MatterscategoryExclusive: China considers over $1.4 trillion in extra debt over next few years * BusinesscategoryGazprom subsidiary files $880 mln claim against Linde * MarketscategoryAsian stocks slip as tech drags, yen near 3-month low before BOJ decision * TechnologycategorySmartphone maker Honor announces investment from China Telecom and CICC Capital Corp * WorldcategoryUS secured release of pastor from China with trade for Chinese citizen, Politico reports WORLD * RUSSIA ASKS AT UN: IF WEST AIDS UKRAINE, WHY CAN'T NORTH KOREA HELP US? Worldcategory · October 31, 2024 · 3:31 AM GMT+1 · 6 min ago Russia's envoy to the United Nations on Wednesday questioned why its allies like North Korea could not help Moscow in its war against Ukraine given Western countries claim the right to help Kyiv. * EnvironmentcategoryTaiwan shuts down for arrival of strong Typhoon Kong-rey3:19 AM GMT+1 · Updated 18 min ago * WorldcategoryUS secured release of pastor from China with trade for Chinese citizen, Politico reports3:16 AM GMT+1 · Updated 22 min ago * United StatescategoryIn U.S. swing states, officials brace for conspiracy theories and violence3:09 AM GMT+1 · Updated 29 min ago * Asia PacificcategoryNorth Korea long-range ballistic missile test splashes down between Japan and Russia3:05 AM GMT+1 · Updated 33 min ago SITE INDEX LATEST * Home * Authors * Topic Sitemap * Archive * Article Sitemap BROWSE * World * Business * Markets * Sustainability * Legal * Breakingviews * Technology * Investigations * Sports * Science * Lifestyle MEDIA * Videos * Pictures * Graphics * Podcasts ABOUT REUTERS * About Reuters, opens new tab * Careers, opens new tab * Reuters News Agency, opens new tab * Brand Attribution Guidelines, opens new tab * Reuters and AI, opens new tab * Reuters Leadership, opens new tab * Reuters Fact Check * Reuters Diversity Report, opens new tab STAY INFORMED * Download the App (iOS), opens new tab * Download the App (Android), opens new tab * Newsletters INFORMATION YOU CAN TRUST Reuters, the news and media division of Thomson Reuters, is the world’s largest multimedia news provider, reaching billions of people worldwide every day. Reuters provides business, financial, national and international news to professionals via desktop terminals, the world's media organizations, industry events and directly to consumers. FOLLOW US * X * Facebook * Instagram * Youtube * Linkedin THOMSON REUTERS PRODUCTS * WESTLAW, OPENS NEW TAB BUILD THE STRONGEST ARGUMENT RELYING ON AUTHORITATIVE CONTENT, ATTORNEY-EDITOR EXPERTISE, AND INDUSTRY DEFINING TECHNOLOGY. * ONESOURCE, OPENS NEW TAB THE MOST COMPREHENSIVE SOLUTION TO MANAGE ALL YOUR COMPLEX AND EVER-EXPANDING TAX AND COMPLIANCE NEEDS. * CHECKPOINT, OPENS NEW TAB THE INDUSTRY LEADER FOR ONLINE INFORMATION FOR TAX, ACCOUNTING AND FINANCE PROFESSIONALS. LSEG PRODUCTS * WORKSPACE, OPENS NEW TAB ACCESS UNMATCHED FINANCIAL DATA, NEWS AND CONTENT IN A HIGHLY-CUSTOMISED WORKFLOW EXPERIENCE ON DESKTOP, WEB AND MOBILE. * DATA CATALOGUE, OPENS NEW TAB BROWSE AN UNRIVALLED PORTFOLIO OF REAL-TIME AND HISTORICAL MARKET DATA AND INSIGHTS FROM WORLDWIDE SOURCES AND EXPERTS. * WORLD-CHECK, OPENS NEW TAB SCREEN FOR HEIGHTENED RISK INDIVIDUAL AND ENTITIES GLOBALLY TO HELP UNCOVER HIDDEN RISKS IN BUSINESS RELATIONSHIPS AND HUMAN NETWORKS. * Advertise With Us, opens new tab * Advertising Guidelines * Purchase Licensing Rights, opens new tab * Cookies, opens new tab * Terms of Use * Privacy, opens new tab * Digital Accessibility, opens new tab * Corrections * Site Feedback, opens new tab All quotes delayed a minimum of 15 minutes. See here for a complete list of exchanges and delays. © 2024 Reuters. All rights reserved RIGHT TO WITHDRAW CONSENT UNDER GDPR We and our 151 partners store and/or access information on a device, such as unique IDs in cookies to process personal data. You may accept or manage your choices by clicking below, including your right to object where legitimate interest is used, or at any time in the privacy policy page. These choices will be signaled to our partners and will not affect browsing data.Cookie PolicyPrivacy Statement WE AND OUR PARTNERS PROCESS DATA TO PROVIDE: Use precise geolocation data. Actively scan device characteristics for identification. Store and/or access information on a device. Personalised advertising and content, advertising and content measurement, audience research and services development. List of Partners (vendors) Allow All Reject All Show Purposes Feedback