Chinese Hackers Breach Critical US Infrastructure, Cyberwarcon Reveals
Chinese hackers have infiltrated the IT infrastructure of critical facilities in the United States, posing a severe risk in the event of a potential conflict, according to Morgan Adamski, Director of the U.S. Cyber Command. Speaking at the Cyberwarcon conference, Adamski emphasized that these Chinese operations are strategically aimed at gaining an upper hand in the event of a significant confrontation with the U.S.
Adamski stated that Chinese hackers have compromised IT systems, laying the groundwork for potential disruptive attacks. Their targets include systems controlling essential operations, such as heating, ventilation, and air conditioning for server rooms, as well as energy and water facilities.
U.S. Senator Mark Warner underscored the scale of the cyberattack, which targeted telecommunications companies, describing it as the largest of its kind in American history. The campaign, known as Salt Typhoon, involved stealing call data, intercepting communications from high-ranking officials within both presidential campaigns ahead of the November 5 elections, and gathering telecommunication information linked to law enforcement requests.
The FBI announced that it is collaborating with CISA to provide technical assistance and intelligence to potential targets. Moreover, the U.S. is coordinating a global response to counter Chinese cyber operations. Measures include disclosing details of the attacks, imposing sanctions, initiating criminal cases, taking law enforcement actions, and issuing cybersecurity recommendations in partnership with international allies.
Beijing has repeatedly denied involvement in cyberattacks on U.S. infrastructure. The Chinese Embassy in Washington has not yet commented on the matter.
Previously, officials have expressed ongoing concerns about Chinese hackers and advised network administrators and security teams to remain vigilant. They emphasized the importance of monitoring suspicious activity, particularly the misuse of legitimate tools for malicious purposes.