We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions
cover of episode How China’s Cyber Threat Looms Over America

How China’s Cyber Threat Looms Over America

2025/1/8
logo of podcast WSJ Tech News Briefing

WSJ Tech News Briefing

AI Deep Dive AI Insights AI Chapters Transcript
People
D
Dustin Volz
J
James Rundle
Topics
James Rundle: 本期节目讨论了中国黑客对美国关键基础设施和电信网络的持续入侵,以及这些行动对国家安全构成的严重威胁。报道揭示了中国黑客入侵美国港口、管道、水处理系统和机场等关键基础设施的程度,以及他们入侵主要电信提供商网络窃听政府官员和政治人物通信的能力。这些行动引发了美国高级情报官员的担忧,他们认为中国正在为潜在的冲突(例如与台湾相关的冲突)做准备,并可能在冲突爆发时利用这些入侵来制造混乱。 James Rundle: 报道还强调了美国政府为应对这些威胁所做的努力,包括公开披露信息、拆除僵尸网络以及与各部门共享威胁情报,以帮助关键基础设施系统提供商加强网络安全防护。然而,尽管政府采取了这些措施,但新的网络攻击仍在持续发生,这凸显了中国网络威胁的严重性和复杂性。 Dustin Volz: 中国长期以来一直积极参与网络攻击,目标包括美国系统、私营部门公司和政府机构。然而,当前的网络行动与以往不同,令人担忧的是,他们不再仅仅窃取商业机密或个人数据,而是入侵大量关键基础设施公司系统,为未来可能的冲突(可能与台湾有关)做准备,试图阻止或恐吓美国卷入热冲突。 Dustin Volz: 中国黑客入侵了美国电信网络,能够监控高级目标的电话和短信。这些行动加剧了美国官员对中国行动的担忧,也显示了中国网络黑客资源的复杂性和规模。在关键基础设施攻击中,中国黑客并没有破坏系统,而是潜伏等待,为未来的行动做准备。他们入侵的许多系统并没有明显的情报价值,这表明他们的目的是潜伏等待,而非窃取信息。这种潜伏等待的行为令人担忧,这表明他们可能计划在与美国的冲突中破坏这些系统。 Dustin Volz: 中国政府否认了这些指控,并声称美国也存在类似行为。针对电信网络的入侵,中国黑客利用了已知的、未修补的漏洞,这些漏洞是公开的,安全分析师和专家也了解这些漏洞。受影响的电信公司包括Verizon和AT&T,以及其他一些较小的公司。黑客能够劫持大型网络路由器来隐藏他们的活动。拜登政府推动了针对不同行业的最低网络安全标准,但尚未针对电信行业实施。政府行动缓慢,以及人们认为电信公司资源充足,不需要强制性网络安全规定,是导致电信行业缺乏强制性网络安全规定的原因。电信公司声称已经解决了黑客问题,但美国官员对此表示怀疑,认为鉴于入侵的深度和广度,彻底清除黑客可能为时尚早。多位高级网络官员辞职,给即将上任的政府带来了挑战。对即将上任的政府来说,这是一个巨大的挑战,他们需要优先解决电信黑客问题,并采取措施阻止中国的行为。即将上任的政府对这个问题将如何处理以及是否会支持行业网络安全强制性规定尚不清楚。

Deep Dive

Key Insights

What are the two major Chinese hacking operations targeting U.S. critical infrastructure?

The two major Chinese hacking operations targeting U.S. critical infrastructure are named Salt Typhoon and Vault Typhoon. These operations have infiltrated systems across ports, pipelines, water treatment systems, and airports, positioning themselves to cause disruption in the event of a conflict, likely over Taiwan.

Why are U.S. officials particularly alarmed by China's recent cyber activities?

U.S. officials are alarmed because Chinese hackers are not just stealing data or intellectual property but are infiltrating critical infrastructure systems like pipelines, water sanitation, and airports. They are lying in wait, preparing to disrupt these systems in the event of a conflict, particularly over Taiwan. This represents a shift from traditional cyber espionage to potential cyber warfare.

How have Chinese hackers compromised U.S. telecom networks?

Chinese hackers exploited unpatched vulnerabilities in aging telecom infrastructure to infiltrate U.S. telecom networks. They hijacked large network routers, enabling them to surveil phone conversations and text messages of government officials, political figures, and others. Major telecom providers like Verizon and AT&T were among the victims.

What has the U.S. government done to counter Chinese cyber intrusions?

The U.S. government has dismantled botnets used by Chinese hackers, publicly disclosed critical infrastructure hacking activity, and shared threat intelligence with affected sectors. Additionally, the Biden administration has pushed for minimum cybersecurity mandates in industries like pipelines and aviation, though telecoms have not yet been included in these mandates.

How has China responded to U.S. accusations of cyber espionage?

China has repeatedly denied involvement in cyber espionage, dismissing U.S. accusations as fabricated. During a visit by U.S. Secretary of State Antony Blinken, Chinese officials claimed the activities might be the work of criminal ransomware groups and accused the U.S. of similar cyber activities, calling the allegations smears and lies.

What challenges does the incoming Trump administration face regarding Chinese cyber threats?

The incoming Trump administration faces significant challenges, including addressing the deep and widespread compromises in U.S. telecom networks. While some officials have prioritized deterring China, it remains unclear whether the administration will support mandatory cybersecurity regulations, as Republicans have historically favored voluntary measures over government mandates.

What is the significance of Chinese hackers lying in wait in U.S. critical infrastructure systems?

Chinese hackers lying in wait in U.S. critical infrastructure systems signifies a strategic move to prepare for future conflicts, particularly over Taiwan. By maintaining access without immediate disruption, they aim to deter U.S. intervention and potentially unleash chaos by disrupting essential services like power grids, water treatment, and transportation systems during a crisis.

Chapters
This chapter explores the alarming depth of Chinese cyber intrusions into US critical infrastructure. Intelligence officials are concerned about China's ability to cause widespread havoc by targeting systems like pipelines and water treatment facilities. The concerning aspect is that China isn't disrupting systems; instead, it's waiting to unleash chaos in a future conflict.
  • Chinese hackers have infiltrated US critical infrastructure, including ports, pipelines, water treatment systems, and airports.
  • The intrusions, called Volt Typhoon, show no signs of immediate disruption, suggesting a strategic wait for future conflict.
  • The lack of apparent intelligence value in the targeted systems raises concerns about China's long-term intentions.

Shownotes Transcript

Translations:
中文

This episode is brought to you by Amazon. Sometimes the most painful part of getting sick is the getting better part. Waiting on hold for an appointment, sitting in crowded waiting rooms, standing in line at the pharmacy, that's painful. Amazon One Medical and Amazon Pharmacy remove those painful parts of getting better with things like 24-7 virtual visits and prescriptions delivered to your door. Thanks to Amazon Pharmacy and Amazon One Medical, healthcare just got less painful.

Welcome to Tech News Briefing. It's Wednesday, January the 8th. I'm James Rundle for The Wall Street Journal. Chinese hackers have been a menace in cyberspace for years, targeting the US government and the private sector, as well as presidential campaigns. But revelations about how deeply its hackers have penetrated US critical infrastructure have worried senior intelligence officials.

We'll hear from our reporter Dustin Volz about how Chinese digital spies have infiltrated some of the most vital organizations in the US, positioning themselves to cause havoc if a conflict breaks out. Two massive hacking operations named Salt Typhoon and Vault Typhoon by researchers have spooked intelligence officials. Chinese hackers have broken into systems across ports, pipelines, water treatment systems and airports across the US in recent years,

and done nothing. That's according to senior US officials, who say China is preparing to unleash chaos if America were to intervene in a future conflict, likely over Taiwan. Separately, Chinese spies also infiltrated the networks of major telecoms providers, enabling them to spy on text messages and phone calls from government officials, political figures and others. The WSJ interviewed dozens of national security, law enforcement and private sector officials about these attacks,

Our reporter Dustin Volz joins us to discuss how serious China's intrusions are and what Washington is doing about it.

Justin, China has been in the headlines a lot in the past year for cyber activity. Can you put this in perspective? How sophisticated and aggressive have its actions been with its recent campaigns compared with its past activity? China has always been pretty aggressive in cyberspace and for really 15, 20 years now has been targeting US systems, private sector companies, government agencies. In 2008, for example, they hacked both the Obama and McCain presidential campaigns. So

So cyber aggression from China is nothing new. What's new here and what they're doing now is just different and alarming to senior U.S. intelligence officials because instead of stealing private intellectual property from businesses or just mass quantities of personal data, they're breaking into scores of critical infrastructure companies

systems, think pipelines, water sanitation systems, regional airports, for the purpose of preparing for a future conflict, likely over Taiwan, and trying to basically deter or intimidate the U.S. from engaging in a hot conflict. And that, combined with these separate intrusions into U.S. telecom networks that have been going on for well over a year in some cases, and

have allowed the Chinese hackers to surveil high profile targets by listening to their phone conversations and in some cases, reading their text messages. These two attacks have combined to really put US officials on a new level of concern about what Beijing's been doing and just how not only sophisticated, but how vast their cyber hacking resources really are. So what has China actually been doing once it's compromised these systems?

In the critical infrastructure attacks, which researchers call Volt Typhoon, they aren't actually disrupting systems. They're not taking down airports or slowing systems to a halt or anything like that. But what they are doing is lying in wait, essentially. They're getting in and waiting for future tasking orders to potentially do something that is more disruptive. And the reason U.S. officials are so convinced that this is what they're doing is

They're breaking into systems with no clear intelligence value, nothing really worth stealing. So they might break into a municipal emergency response system in Los Angeles, for example, and then lying in wait for months on end, or in some cases years, and periodically checking back to make sure that they have maintained that access into the systems. That's it.

The inaction there is what's being seen as so alarming by U.S. and Western security officials, because if they're just lying there and wait, what are their future plans? And the assessment is that their future plans are to wait until there is a conflict directly with the U.S., and then they can start doing things to disrupt these systems. Sure. And when we start talking about power grids, about water treatment facilities, about ports, pipelines, it has a very chilling effect. What has Washington done about this?

A year ago, last January, senior U.S. officials actually came forward and disclosed a lot of the critical infrastructure hacking activity. There was an effort to dismantle a botnet, which is sort of hijacked computer systems that were being used to help the Chinese enter these systems. So the authorities came out and dismantled that botnet. They made it very clear publicly that they didn't tolerate this activity and that they were looking for other victims and they were sharing threat intelligence information.

with these different sectors in hopes that they would find other places that the hackers have been burrowing and hiding. And that's what they've been doing for now a couple of years is detecting dozens of critical infrastructure systems across the country where they are sort of lying in wait and have maintained persistent access. So the campaign to educate these often under-resourced hackers

critical infrastructure systems, these providers, to help them protect their systems. The campaign to educate them continues. They're finding the hackers in more places. But what's alarming is that at the same time that the White House and others have been pushing to try to deal with this issue of the infrastructure hacking, a separate group of Chinese hackers linked to their top intelligence agency

had been very sneakily embedding itself into U.S. telecommunications infrastructure and doing so in a way where they were able to, in some cases,

surveil directly the conversations of senior U.S. officials and political figures, and also access U.S. law enforcement systems they use to wiretap criminal suspects, including potentially Chinese spies in the U.S. It's sort of just, you know, you try to address one problem and then you wake up and there's a whole other crisis. Chinese hackers are everywhere all at once and they're preparing for war. And that's really sort of what's so frightening right now for a lot of U.S. officials.

What has the Chinese government said about this? The Chinese government has denied this repeatedly. In fact, U.S. officials, including Secretary Blinken, have attempted to directly confront senior Chinese Communist Party officials. Last April, while visiting China, Secretary Blinken actually presented essentially evidence saying that

we know that you're in all these systems, that your hackers are doing these things, and we really need you to cut it out. And China basically said, we have no idea what you're talking about. This looks like it might be a criminal ransomware group, if anything. We have nothing to do with it. Please stop with these fabricated assertions. And then publicly, Chinese officials will say that they are not doing anything that the U.S. isn't also doing. These are smears, these are lies. The true criminal out there when it comes to cybersecurity is the U.S. government. So that is how China has been responding.

Coming up, we hear about how hackers managed to breach systems at telecom giants and the challenge this presents for President-elect Donald Trump's administration. That's after the break. Taxi! Imagine hailing a cab with no one in the driver's seat. Welcome. Please buckle your seatbelt and enjoy the ride.

Self-driving car company Waymo has spent billions developing its tech. What's changed is machine learning. I'm not really thinking about who's driving. But will this big bet pay off for Waymo and its parent, Google owner Alphabet? Find out in Driverless, Waymo and the Robotaxi Race, a new series in the WSJ's Future of Everything feed.

You mentioned earlier that a lot of critical infrastructure companies tend to be poorly resourced when it comes to cybersecurity. Major telecoms companies we don't generally associate with a lack of resources. Do we know how China has achieved such unprecedented compromise into all these companies? We know some details about it. It's still sort of an evolving process and investigators continue to learn more. But we know that in the telecom hacks, it appears as though in China,

All or nearly all cases, the intrusions relied on unpatched vulnerabilities that were known to the public and known to security analysts and experts. In other words, there was aging old telecom infrastructure that was leveraged and accessed by the hackers because

They just didn't have the defenses that they needed and they hadn't been patched and they weren't up to date. And there will be a lot of finger pointing to come in the months ahead as investigators continue to sort through this. But that's really stunning because, as you said, these are well-resourced telecommunications companies. The victims include Verizon and AT&T, the two biggest in the U.S., as well as a lot of other ones that are smaller. But in each case, and each case was different in some respects, the hackers were able to

hijack large network routers, essentially, and use those to conceal their activity, to cover their tracks, to do a lot of espionage. And U.S. officials in the Biden administration have really pushed over the last four years to install minimum cybersecurity mandates for different industries. For example, after the Colonial Pipeline hack of 2021 that briefly led to the shutdown of the largest conduit of fuel on the East Coast, the

The Biden administration pushed forward mandates for pipelines, cybersecurity mandates that basically made it so that they had to comply with baseline requirements for cybersecurity. The administration has done this in a couple of other industries as well, including aviation, but they haven't done it in telecoms. And the officials I spoke to about this asking them why.

It's for a number of reasons. Government can be slow, but also a lot of folks thought that telecoms were actually already well-resourced, that they had a pretty good sense of their cybersecurity and were able to invest in it heavily already, and that they didn't need these kinds of executive action resources.

regulatory mandates the same way that some of the other industries seemingly were more urgent and needing of attention. And so now you're seeing that the Federal Communications Commission and others are taking a look at what they can do to potentially increase the cybersecurity standards for telecommunications networks. And the companies are saying they recognize that the cybersecurity is existential for them and that they need to do more to make sure that these types of attacks are dealt with and hopefully don't happen again.

So the big question is, now that we know the hackers have been in the networks, are they still there? So the companies say that they believe they have basically addressed this issue in the telecom hacks with the group that researchers at Microsoft and elsewhere have called Salt Typhoon. They say that they're out, essentially, but U.S. officials say that they're not so sure. A number of people we spoke to who are deeply involved in the investigation here said that they were surprised to see these statements from

some of the carriers and that the compromises were so deep that

and so vast within the major telecommunications networks that it's really going to be hard to definitively say that they are fully out of the network. And to do so at this stage might be somewhat premature. And of course, we have a new administration coming in a few weeks, which is resulting in the resignation of a number of senior cyber officials who have been dealing with this. Jenny Sully, the director of the Cybersecurity Infrastructure Security Agency. Harry Koch, the national cyber director. How much of a challenge does this present for the incoming administration?

It's a huge challenge for the incoming Trump administration and some officials, including President-elect Trump's nominee to be chairman of the Federal Communications Commission, Brendan Carr, have spoken about the telecom hacks and said it's a priority and that we need to do more to deter China from

It's absolutely a key national security issue for them. It's unclear what President-elect Trump will do here with China, but he's obviously been very, very tough rhetorically on China. So it remains to be seen how they're going to address this and whether or not they're going to be supportive of these cybersecurity mandates on industry that historically Republicans in Congress and elsewhere have been resistant to. They often favor more voluntary arrangements for cybersecurity. That was our reporter, Dustin Fowles.

That's it for Tech News Briefing. Today's show was produced by Julie Chang with supervising producer Catherine Milsom. I'm James Rundle for The Wall Street Journal. We'll be back this afternoon with TMB Tech Minute. Thanks for listening.