I get why China has to officially deny their hackings but their ability to freely destroy any American company, govt agency, or the government itself is horrifying and a clear example of their advanced, superior military-industrial complex.
This is a threat to America and it must change. We have got to get the boomers out of the government, or at least awake to computers, before it kills us.
TacoCatSupreme1 on
Probably using super computers to crack rsa
cboel on
Part of the information war is to lie and blame the victim of the attack. It is interesting to note how China choses how to lie about what they did. Especially since they know the hacking group is known by several different names and has a long history.
>In May 2023, the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and the Cybersecurity Infrastructure Security Agency (CISA) issued a joint warning (PDF) about Volt Typhoon, also known as “Bronze Silhouette” and “Insidious Taurus,” which described how the group uses small office/home office (SOHO) network devices to hide their activity.
>
>In early December 2023, Black Lotus Labs published its findings on “KV-botnet,” thousands of compromised SOHO routers that were chained together to form a covert data transfer network supporting various Chinese state-sponsored hacking groups, including Volt Typhoon.
>
>In January 2024, the U.S. Department of Justice disclosed the FBI had executed a court-authorized takedown of the KV-botnet shortly before Black Lotus Labs released its December report.
>
>In February 2024, CISA again joined the FBI and NSA in warning Volt Typhoon had compromised the IT environments of multiple critical infrastructure organizations — primarily in communications, energy, transportation systems, and water and wastewater sectors — in the continental and non-continental United States and its territories, including Guam.
>
>src: https://krebsonsecurity.com/2024/08/new-0-day-attacks-linked-to-chinas-volt-typhoon/
GetOutOfTheWhey on
Is there any evidence to prove they arent behind it?
Or any evidence to prove they were behind it?
Actually doesnt matter, in both cases it’s just a trust me bro situation.
marryjw on
Whenever these issues arise, it’s the usual back-and-forth. China typically denies any wrongdoing and points fingers at the U.S.—just another round of blame game between the two. I’m curious to see how this situation will unfold. It’s definitely a complex issue with a lot of different angles
7 Comments
[removed]
And it has a thumbnail of an Australian animal 🧐
I get why China has to officially deny their hackings but their ability to freely destroy any American company, govt agency, or the government itself is horrifying and a clear example of their advanced, superior military-industrial complex.
This is a threat to America and it must change. We have got to get the boomers out of the government, or at least awake to computers, before it kills us.
Probably using super computers to crack rsa
Part of the information war is to lie and blame the victim of the attack. It is interesting to note how China choses how to lie about what they did. Especially since they know the hacking group is known by several different names and has a long history.
>In May 2023, the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and the Cybersecurity Infrastructure Security Agency (CISA) issued a joint warning (PDF) about Volt Typhoon, also known as “Bronze Silhouette” and “Insidious Taurus,” which described how the group uses small office/home office (SOHO) network devices to hide their activity.
>
>In early December 2023, Black Lotus Labs published its findings on “KV-botnet,” thousands of compromised SOHO routers that were chained together to form a covert data transfer network supporting various Chinese state-sponsored hacking groups, including Volt Typhoon.
>
>In January 2024, the U.S. Department of Justice disclosed the FBI had executed a court-authorized takedown of the KV-botnet shortly before Black Lotus Labs released its December report.
>
>In February 2024, CISA again joined the FBI and NSA in warning Volt Typhoon had compromised the IT environments of multiple critical infrastructure organizations — primarily in communications, energy, transportation systems, and water and wastewater sectors — in the continental and non-continental United States and its territories, including Guam.
>
>src: https://krebsonsecurity.com/2024/08/new-0-day-attacks-linked-to-chinas-volt-typhoon/
Is there any evidence to prove they arent behind it?
Or any evidence to prove they were behind it?
Actually doesnt matter, in both cases it’s just a trust me bro situation.
Whenever these issues arise, it’s the usual back-and-forth. China typically denies any wrongdoing and points fingers at the U.S.—just another round of blame game between the two. I’m curious to see how this situation will unfold. It’s definitely a complex issue with a lot of different angles