acm-header
Sign In

Communications of the ACM

ACM TechNews

U.S. Hunts Chinese Malware That Could Disrupt Military Operations


View as: Print Mobile App Share:
A fighter jet taking off from Andersen Air Force Base in Guam earlier this year.

The Chinese code, the officials say, appears directed at ordinary utilities that often serve both civilian populations and nearby military bases.

Credit: Chang W. Lee/The New York Times

U.S. military, intelligence, and national security officials say the White House is hunting for malware purportedly concealed by China within infrastructure critical to U.S. military bases at home and abroad.

They worry that the code could enable Chinese hackers to disrupt military operations should a conflict erupt, with one official warning of power, water, and communications interruptions.

Microsoft's announcement in May of detecting mysterious code in telecommunications systems in Guam—home to major U.S. bases—and elsewhere in the U.S. was the first inkling of the malware campaign.

Microsoft credited the Guam code to a Chinese state-sponsored hacking gang called Volt Typhoon, which other U.S. security agencies echoed.

White House officials advised removing the malware as soon it could be found, although some officials say this risks encouraging Chinese hackers to enhance their methods and deploy harder-to-detect code.

From The New York Times
View Full Article - May Require Paid Subscription

 

Abstracts Copyright © 2023 SmithBucklin, Washington, D.C., USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account