U.S. officials note a significant shift in Chinese cyber activities from espionage to potential disruption or destruction of critical infrastructure. This change aligns with Chinese military documents discussing the use of cyber tools in conflict, particularly in scenarios like an amphibious invasion of Taiwan.
The Chinese hackers often masked their activities, using innocuous devices like home routers for their attacks and stealing employee credentials for future access. These tactics suggest a long-term strategy of reconnaissance and potential future attacks, diverging from previous Chinese cyber operations focused more on intelligence gathering.
The U.S. government, recognizing the severity of these threats, has been working to strengthen cybersecurity in critical sectors and improve coordination with the private sector. This includes issuing mandatory cybersecurity rules and encouraging better monitoring and more secure authentication methods.
Source: Washingtonpost
To mitigate potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net or you can try your self using check.website.