January 30, 2024
I'm not sure why in a cyberwarfare environment the government needs legal authorization to counter and defend from cyber attacks.
"Volt Typhoon (hacking group) has functioned by taking control of swaths of vulnerable digital devices around the world - such as routers, modems, and even internet-connected security cameras - to hide later, downstream attacks into more sensitive targets, security researchers told Reuters. This constellation of remotely controlled systems, known as a botnet, are of primary concern to security officials because they limit the visibility of cyber defenders that monitor for foreign footprints in their computer networks. "How it works is the Chinese are taking control of a camera or modem that is positioned geographically right next to a port or ISP (internet service provider) and then using that destination to route their intrusions into the real target," said a former official familiar with the matter. "To the IT team at the downstream target it just looks like a normal, native user that's sitting nearby." "
Exclusive: US disabled Chinese hacking network targeting critical infrastructure
reuters.com
Posted by: Timothy Birdnow at
12:32 PM
| Comments (3)
| Add Comment
Post contains 179 words, total size 1 kb.
Posted by: fundamentals toys at February 20, 2024 11:53 AM (HfLBU)
Posted by: Mike Rooney at March 11, 2024 05:56 AM (NHUim)
Posted by: alexjimn at May 28, 2024 04:09 PM (qrH/N)
37 queries taking 0.1593 seconds, 169 records returned.
Powered by Minx 1.1.6c-pink.