TechCrunch News 01月07日
Meet the Chinese ‘Typhoon’ hackers preparing for war
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

美国国家安全官员指出,中国支持的黑客对美国构成了“划时代”的威胁,他们已深入渗透到美国关键基础设施的网络中,包括水、能源和交通供应商。这些黑客的目标是在未来中美冲突(如台湾问题)中,发动破坏性网络攻击。美国政府已采取行动打击“台风”系列黑客组织,并公开了这些组织的威胁细节。其中,“伏特台风”组织旨在破坏美国军事动员能力,而“亚麻台风”组织则利用一家北京的网络安全公司掩盖其活动。最近出现的“盐台风”组织则通过入侵电信系统,获取美国公民的通话和短信数据,甚至包括执法部门的监听信息。这些行动显示,中国支持的黑客正积极准备对美国发动网络攻击。

⚠️ “伏特台风”组织:不再仅窃取美国机密,而是为破坏美国军事动员能力做准备,通过入侵路由器、防火墙和VPN等网络设备,渗透美国关键基础设施,预先部署以备未来发动破坏性网络攻击。

🌪️ “亚麻台风”组织:利用一家北京的网络安全公司作为掩护,攻击台湾的政府机构、教育机构、关键制造业和信息技术组织,并操控由数十万被劫持的互联网设备组成的僵尸网络,对美国及全球的网络进行攻击。

📞 “盐台风”组织:通过入侵美国电信和互联网供应商,获取数百万用户的通话和短信元数据,甚至可以捕获高级美国官员的通话录音,并可能访问美国政府的数据请求系统,包括美国监视的中国目标身份。

Of the cybersecurity risks facing the United States today, few loom larger than the potential sabotage capabilities posed by China-backed hackers, which senior U.S. national security officials have described as an “epoch-defining threat.”

The U.S. says Chinese government-backed hackers have — in some cases for years — been burrowing deep into the networks of U.S. critical infrastructure, including water, energy, and transportation providers. The goal, officials say, is to lay the groundwork for potentially destructive cyberattacks in the event of a future conflict between China and the United States, such as over a possible Chinese invasion of Taiwan.

“China’s hackers are positioning on American infrastructure in preparation to wreak havoc and cause real-world harm to American citizens and communities, if or when China decides the time has come to strike,” then-outgoing FBI Director Christopher Wray told lawmakers last year.

The U.S. government and its allies have since taken action against some of the “Typhoon” family of Chinese hacking groups, and published new details about the threats posed by these groups.

In January 2024, the U.S. disrupted “Volt Typhoon,” a group of Chinese government hackers tasked with setting the stage for destructive cyberattacks. Later in September 2024, federal authorities took control of a botnet run by another Chinese hacking group called “Flax Typhoon,” which used a Beijing-based cybersecurity company to help conceal the activities of China’s government hackers. Then in December 2025, the U.S. government sanctioned the cybersecurity company for its alleged role in “multiple computer intrusion incidents against U.S. victims.”

Since the emergence of Volt Typhoon, another new China-backed hacking group called “Salt Typhoon” appeared in the networks of U.S. phone and internet giants, capable of gathering intelligence on Americans — and potential targets of U.S. surveillance — by compromising telecom systems used for law enforcement wiretaps.

Here’s what we have learned about the Chinese hacking groups gearing up for war. 

Volt Typhoon represents a new breed of China-backed hacking groups; no longer just aimed at stealing sensitive U.S. secrets, but rather preparing to disrupt the U.S. military’s “ability to mobilize,” according to the then-FBI director.

Microsoft first identified Volt Typhoon in May 2023, finding that the hackers had targeted and compromised network equipment, such as routers, firewalls, and VPNs, since at least mid-2021 as part of an ongoing and concerted effort to infiltrate deep into the systems of U.S. critical infrastructure. The U.S. intelligence community said that in reality, it’s likely the hackers were operating for much longer, potentially for as long as five years.

Volt Typhoon compromised thousands of these internet-connected devices in the months following Microsoft’s report, exploiting vulnerabilities in devices that were considered “end-of-life” and therefore would no longer receive security updates. The hacking group subsequently gained further access to the IT environments of multiple critical infrastructure sectors, including aviation, water, energy, and transportation, pre-positioning for activating future disruptive cyberattacks aimed at slowing the U.S. government’s response to an invasion of its key ally, Taiwan.

“This actor is not doing the quiet intelligence collection and theft of secrets that has been the norm in the U.S. They are probing sensitive critical infrastructure so they can disrupt major services if, and when, the order comes down,” said John Hultquist, chief analyst at security firm Mandiant.

The U.S. government said in January 2024 that it had successfully disrupted a botnet, used by Volt Typhoon, consisting of thousands of hijacked U.S.-based small office and home network routers, which the Chinese hacking group used to hide its malicious activity aimed at targeting U.S. critical infrastructure. The FBI said it was able to remove the malware from hijacked routers by way of a court-sanctioned operation, severing the Chinese hacking group’s connection to the botnet.

By January 2025, the U.S. had discovered more than 100 intrusions across the country and its territories linked to Volt Typhoon, according to reporting by Bloomberg. A large number of these attacks have targeted Guam, a U.S. island territory in the Pacific and a strategic location for American military operations, the report said. Volt Typhoon allegedly targeted critical infrastructure on the island, including its main power authority, the island’s largest cell provider, and several U.S. federal networks, including sensitive defense systems, based on Guam. Bloomberg reported that Volt Typhoon used an entirely new kind of malware to target networks in Guam that it hadn’t ever deployed before, which researchers took as a sign of the high importance that the region has to the China-backed hackers.

Flax Typhoon, first outed by Microsoft several months later in an August 2023 report, is another China-backed hacking group, which officials say has operated under the guise of a publicly traded cybersecurity company based in Beijing to carry out hacks against critical infrastructure in recent years. Microsoft said Flax Typhoon — also active since mid-2021 — predominantly targeted dozens of “government agencies and education, critical manufacturing, and information technology organizations in Taiwan.”

Then in September 2023, the U.S. government said it had taken control of another botnet, which was made up of hundreds of thousands of hijacked internet-connected devices, and used by Flax Typhoon to “conduct malicious cyber activity disguised as routine internet traffic from the infected consumer devices.” Prosecutors said the botnet allowed other China government-backed hackers to “hack into networks in the U.S. and around the world to steal information and hold our infrastructure at risk.” 

The Department of Justice later corroborated Microsoft’s findings, adding that Flax Typhoon also “attacked multiple U.S. and foreign corporations.”

U.S. officials said that the botnet used by Flax Typhoon was operated and controlled by the Beijing-based cybersecurity company, Integrity Technology Group. In January 2024, the U.S. government imposed sanctions on Integrity Tech over its alleged links to Flax Typhoon. 

The latest — and potentially most ominous — group in China’s government-backed cyber army uncovered in recent months is Salt Typhoon.

Salt Typhoon hit headlines in October 2024 for a different kind of information-gathering operation. As first reported by The Wall Street Journal, the China-linked hacking group compromised several U.S. telecom and internet providers, including AT&T, Lumen (formerly CenturyLink), and Verizon. The Journal reported later in January 2025 that Salt Typhoon also breached the U.S.-based internet providers Charter Communications and Windstream. U.S. cyber official Anne Neuberger said the federal government had identified an unnamed ninth hacked telco.

According to one report, Salt Typhoon may have gained access to these telcos using compromised Cisco routers. Once inside the telco’s networks, the attackers were able to access customer call and text message metadata, including date and time stamps of customer communications, source and destination IP addresses, and phone numbers from over a million users; most of which were individuals located in the Washington D.C. area. In some cases the hackers were capable of capturing phone audio from senior Americans. Neuberger said that a “large number” of those who had data accessed were “government targets of interest.”

By hacking into systems that law enforcement agencies use for court-authorized collection of customer data, Salt Typhoon also potentially gained access to data and systems that house much of the U.S. government’s data requests, including the potential identities of Chinese targets of U.S. surveillance. 

It’s not yet known when the breach of the wiretap systems occurred, but may date back to early 2024, according to the Journal’s reporting.

AT&T and Verizon told TechCrunch in December 2024 that their networks were secure after being targeted by the Salt Typhoon espionage group. Lumen confirmed soon after that its network was free from the hackers. 

FIrst published October 13, 2024 and updated.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

网络安全 中国黑客 美国基础设施 网络攻击 情报收集
相关文章