This website collects cookies to deliver better user experience, you agree to the Privacy Policy.
Accept
Sign In
The Texas Reporter
  • Home
  • Trending
  • Texas
  • World
  • Politics
  • Opinion
  • Business
    • Business
    • Economy
    • Real Estate
  • Crypto & NFTs
  • Tech
  • Lifestyle
    • Lifestyle
    • Food
    • Travel
    • Fashion
    • Books
    • Arts
  • Health
  • Sports
  • Entertainment
Reading: How China Transformed Into a Prime Cyber Threat to the U.S.
Share
The Texas ReporterThe Texas Reporter
Font ResizerAa
Search
  • Home
  • Trending
  • Texas
  • World
  • Politics
  • Opinion
  • Business
    • Business
    • Economy
    • Real Estate
  • Crypto & NFTs
  • Tech
  • Lifestyle
    • Lifestyle
    • Food
    • Travel
    • Fashion
    • Books
    • Arts
  • Health
  • Sports
  • Entertainment
Have an existing account? Sign In
Follow US
© The Texas Reporter. All Rights Reserved.
Tech

How China Transformed Into a Prime Cyber Threat to the U.S.

Editorial Board
Editorial Board Published July 19, 2021
Share
How China Transformed Into a Prime Cyber Threat to the U.S.
SHARE

Nearly a decade ago, the United States began naming and shaming China for an onslaught of online espionage, the bulk of it conducted using low-level phishing emails against American companies for intellectual property theft.

On Monday, the United States again accused China of cyberattacks. But these attacks were highly aggressive, and they reveal that China has transformed into a far more sophisticated and mature digital adversary than the one that flummoxed U.S. officials a decade ago.

The Biden administration’s indictment for the cyberattacks, along with interviews with dozens of current and former American officials, shows that China has reorganized its hacking operations in the intervening years. While it once conducted relatively unsophisticated hacks of foreign companies, think tanks and government agencies, China is now perpetrating stealthy, decentralized digital assaults of American companies and interests around the world.

Hacks that were conducted via sloppily worded spearphishing emails by units of the People’s Liberation Army are now carried out by an elite satellite network of contractors at front companies and universities that work at the direction of China’s Ministry of State Security, according to U.S. officials and the indictment.

While phishing attacks remain, the espionage campaigns have gone underground and employ sophisticated techniques. Those include exploiting “zero-days,” or unknown security holes in widely used software like Microsoft’s Exchange email service and Pulse VPN security devices, which are harder to defend against and allow China’s hackers to operate undetected for longer periods.

“What we’ve seen over the past two or three years is an upleveling” by China, said George Kurtz, the chief executive of the cybersecurity firm CrowdStrike. “They operate more like a professional intelligence service than the smash-and-grab operators we saw in the past.”

China has long been one of the biggest digital threats to the United States. In a 2009 classified National Intelligence Estimate, a document that represents the consensus of all 16 U.S. intelligence agencies, China and Russia topped the list of America’s online adversaries. But China was deemed the more immediate threat because of the volume of its industrial trade theft.

But that threat is even more troubling now because of China’s revamping of its hacking operations. Furthermore, the Biden administration has turned cyberattacks — including ransomware attacks — into a major diplomatic front with superpowers like Russia, and U.S. relations with China have steadily deteriorated over issues including trade and tech supremacy.

China’s prominence in hacking first came to the fore in 2010 with attacks on Google and RSA, the security company, and again in 2013 with a hack of The New York Times.

In 2015, Obama officials threatened to greet President Xi Jinping of China with an announcement of sanctions on his first visit to the White House, after a particularly aggressive breach of the U.S. Office of Personnel Management. In that attack, Chinese hackers made off with sensitive personal information, including more than 20 million fingerprints, for Americans who had been granted a security clearance.

White House officials soon struck a deal that China would cease its hacking of American companies and interests for its industrial benefit. For 18 months during the Obama administration, security researchers and intelligence officials observed a notable drop in Chinese hacking.

Updated 

July 20, 2021, 10:36 a.m. ET

After President Donald J. Trump took office and accelerated trade conflicts and other tensions with China, the hacking resumed. By 2018, U.S. intelligence officials had noted a shift: People’s Liberation Army hackers had stood down and been replaced by operatives working at the behest of the Ministry of State Security, which handles China’s intelligence, security and secret police.

Hacks of intellectual property, that benefited China’s economic plans, originated not from the P.L.A. but from a looser network of front companies and contractors, including engineers who worked for some of the country’s leading technology companies, according to intelligence officials and researchers.

It was unclear how exactly China worked with these loosely affiliated hackers. Some cybersecurity experts speculated that the engineers were paid cash to moonlight for the state, while others said those in the network had no choice but to do whatever the state asked. In 2013, a classified U.S. National Security Agency memo said, “The exact affiliation with Chinese government entities is not known, but their activities indicate a probable intelligence requirement feed from China’s Ministry of State Security.”

On Monday, the White House provided more clarity. In its detailed indictment, the United States accused China’s Ministry of State Security of being behind an aggressive assault on Microsoft’s Exchange email systems this year.

The Justice Department separately indicted four Chinese nationals for coordinating the hacking of trade secrets from companies in aviation, defense, biopharmaceuticals and other industries.

According to the indictments, Chinese nationals operated from front companies, like Hainan Xiandun, that the Ministry of State Security set up to give Chinese intelligence agencies plausible deniability. The indictment included a photo of one defendant, Ding Xiaoyang, a Hainan Xiandun employee, receiving a 2018 award from the Ministry of State Security for his work overseeing the front company’s hacks.

The United States also accused Chinese universities of playing a critical role, recruiting students to the front companies and running their key business operations, like payroll.

The indictment also pointed to Chinese “government-affiliated” hackers for conducting ransomware attacks that extort companies for millions of dollars. Scrutiny of ransomware attackers had previously largely fallen on Russia, Eastern Europe and North Korea.

Secretary of State Antony J. Blinken said in a statement on Monday that China’s Ministry of State Security “has fostered an ecosystem of criminal contract hackers who carry out both state-sponsored activities and cybercrime for their own financial gain.”

China has also clamped down on research about vulnerabilities in widely held software and hardware, which could potentially benefit the state’s surveillance, counterintelligence and cyberespionage campaigns. Last week, it announced a new policy requiring Chinese security researchers to notify the state within two days when they found security holes, such as the “zero-days” that the country relied on in the breach of Microsoft Exchange systems.

The policy is the culmination of Beijing’s five-year campaign to hoard its own zero-days. In 2016, the authorities abruptly shuttered China’s best-known private platform for reporting zero-days and arrested its founder. Two years later, Chinese police announced that they would start enforcing laws banning the “unauthorized disclosure” of vulnerabilities. That same year, Chinese hackers, who were a regular presence at big Western hacking conventions, stopped showing up, on state orders.

“If they continue to maintain this level of access, with the control that they have, their intelligence community is going to benefit,” Mr. Kurtz said of China. “It’s an arms race in cyber.”

TAGGED:Technology
Share This Article
Twitter Email Copy Link Print
Previous Article Juan Soto says Home Run Derby ‘helped me out big time’ Juan Soto says Home Run Derby ‘helped me out big time’
Next Article Joseph Kennedy, Bremerton football coach, takes prayer case to Supreme Court Joseph Kennedy, Bremerton football coach, takes prayer case to Supreme Court

Editor's Pick

Sizzling Lady Summer time Begins within the Bathe—Right here’s Learn how to Prep Your Pores and skin

Sizzling Lady Summer time Begins within the Bathe—Right here’s Learn how to Prep Your Pores and skin

We might obtain a portion of gross sales if you buy a product by a hyperlink on this article. Most…

By Editorial Board 8 Min Read
Alpine’s Sizzling Hatch EV Has a Constructed-In, ‘Gran Turismo’ Model Driving Teacher

One other win over its Renault 5 sibling is a multi-link rear…

3 Min Read
Louis Vuitton Is Dropping a New Perfume As a result of It’s Sizzling | FashionBeans

We independently consider all beneficial services and products. Any services or products…

2 Min Read

Latest

“A Family’s Fight to Reclaim Their Legacy”

“A Family’s Fight to Reclaim Their Legacy”

Introduction: For generations, the Wright family has worked and lived…

July 9, 2025

AR Global Inc CEO Kason Roberts Donates to Support Kerrville Storm Victims, Mobilizes Team for Restoration Efforts

Kerrville, Texas — In the aftermath…

July 9, 2025

Bitcoin Tops $109,000 After Senate Passes Trump’s ‘Big Beautiful Bill’ – “The Defiant”

The crypto market posted modest good…

July 9, 2025

Two vital hazard alerts within the June employment report – Indignant Bear

Two vital hazard alerts within the…

July 9, 2025

Simone Biles Thirst Traps in Bikini Amidst Boob Job Hypothesis

Studying Time: 3 minutes Simone Biles…

July 9, 2025

You Might Also Like

My Job Is to Work Out. These Are the Health Trackers I’d Purchase on Prime Day
Tech

My Job Is to Work Out. These Are the Health Trackers I’d Purchase on Prime Day

Within the northern hemisphere, it is arduous to not spend the winter in a state of slumbering sloth, simply ready…

5 Min Read
We Discovered the Greatest Offers Underneath 0 This Prime Day
Tech

We Discovered the Greatest Offers Underneath $100 This Prime Day

Prime Day can be overwhelming, particularly when looking for extra inexpensive objects to fill your buying cart with. We're right…

20 Min Read
The Finest WIRED-Permitted Vacuums on Sale for Prime Day
Tech

The Finest WIRED-Permitted Vacuums on Sale for Prime Day

Cleansing is not simply for spring, and these Amazon Prime Day vacuum offers are ones you possibly can't miss should…

7 Min Read
Espresso! Espresso Now! Get Your Caffeine Repair with These Prime Day Offers
Tech

Espresso! Espresso Now! Get Your Caffeine Repair with These Prime Day Offers

What's extra WIRED than espresso? Earlier than you plug into the matrix, you want your espresso repair. We all know…

7 Min Read
The Texas Reporter

About Us

Welcome to The Texas Reporter, a newspaper based in Houston, Texas that covers a wide range of topics for our readers. At The Texas Reporter, we are dedicated to providing our readers with the latest news and information from around the world, with a focus on issues that are important to the people of Texas.

Company

  • About Us
  • Newsroom Policies & Standards
  • Diversity & Inclusion
  • Careers
  • Media & Community Relations
  • WP Creative Group
  • Accessibility Statement

Contact Us

  • Contact Us
  • Contact Customer Care
  • Advertise
  • Licensing & Syndication
  • Request a Correction
  • Contact the Newsroom
  • Send a News Tip
  • Report a Vulnerability

Term of Use

  • Digital Products Terms of Sale
  • Terms of Service
  • Privacy Policy
  • Cookie Settings
  • Submissions & Discussion Policy
  • RSS Terms of Service
  • Ad Choices

© The Texas Reporter. All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?