Information is power, there is no doubt about it. That makes hackers necessary for many companies and governments. On the one hand, there are those who detect the wounds and warn them, and on the other hand there are those who fight against the crashers, that is, the evil boners. Now a group of hackers linked to the Chinese government has allegedly broken into key infrastructure in the US and Guam and network credentials and stolen sensitive data; as noted by Microsoft and governments in the United States and four other countries.
The group, known by Microsoft as Volt Typhoon, has been active in research and intelligence gathering against the People’s Republic of China for at least two years, according to Microsoft. Members of Volt Typhoon wish to maintain their anonymity use tools already installed or embedded devices an infected government.
The information was not only revealed through the “courtesy” of Bill Gates, but also through participation in the notice FBI, Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Center (ACSC), their Canadian, UK and New Zealand counterparts.
The forum also hid their activity by using the building’s home and office route. According to Microsoft, the goal was “disrupt the crisis communications infrastructure between the United States and the Asian region in the future crisis.
In most cases, Volt Typhoon accesses suspect systems by meeting with strong credentials, the same way authorized users do. However, in a small number of cases, Microsoft has noticed that Volt Typhoon creates proxy workers (computer hardware that acts as an intermediary between servers, basically) on suspect systems to facilitate access. He later commanded the Volt Typhoon creatures and follow the removal of the port manager through the aedile system. Later, the authorities remove the Volt Typhoon agent from the middle of the compromise and there is no trace of his passing there.
Industries affected include communications, manufacturing, utilities, transportation, construction, maritime administration, information technology, and education. Notices provide direction for inconsiderate of any network that is suspect.