Chinese tech firm founded by Huawei veterans in the FBI’s crosshairs

source: reuters.com (contributed by Steve Page)  |  image: fbi.gov

 

WASHINGTON, Jan 16 (Reuters) – The U.S. Commerce Department and FBI are both investigating a little-known telecoms hardware firm founded by senior Huawei veterans in China over possible security risks, sources and documents show.
Founded in 2014, Baicells Technologies opened a North American business the next year in Wisconsin and has since provided telecoms equipment for 700 commercial mobile networks across every U.S. state, according to its website.
The Commerce Department is investigating Baicells on national security grounds and has sent subpoenas to the company, four people said. The U.S. telecoms regulator, the Federal Communications Commission (FCC), is advising it on its review, two of the people said.
The FBI’s interest in its equipment and Chinese origins dates back to at least 2019.

Continue reading “Chinese tech firm founded by Huawei veterans in the FBI’s crosshairs”

Chinese hackers infiltrated US Treasury Secretary’s PC — attackers had access to over 400 PCs

source: tomshardware.com (contributed by Steve Page)  |  image: pexels.com 

 

As reported last week, Chinese hackers infiltrated the U.S. Department of Treasury and gained access to several users’ workstations. However, according to Bloomberg, the infiltration was more severe than initially reported, as hackers managed to access systems belonging to Secretary Janet Yellen and other top officials.

A New Phone Scanner That Detects Spyware Has Already Found 7 Pegasus Infections

source: wired.com (contributed by FAN, Steve Page)  |  image: unsplash.com

 

The mobile device security firm iVerify has been offering a tool since May that makes spyware scanning accessible to anyone—and it’s already turning up victims.

IN RECENT YEARS, commercial spyware has been deployed by more actors against a wider range of victims, but the prevailing narrative has still been that the malware is used in targeted attacks against an extremely small number of people. At the same time, though, it has been difficult to check devices for infection, leading individuals to navigate an ad hoc array of academic institutions and NGOs that have been on the front lines of developing forensic techniques to detect mobile spyware. On Tuesday, the mobile device security firm iVerify is publishing findings from a spyware detection feature it launched in May. Of 2,500 device scans that the company’s customers elected to submit for inspection, seven revealed infections by the notorious NSO Group malware known as Pegasus. Continue reading “Phone Scanner That Detects Spyware”

Rising Threat of China’s Volt Typhoon

image - china tech

source: axios.com (contributed by FAN, Bill Amshey)  |  Image: pexels.com

 

Notorious China-linked hackers known for burrowing deep into U.S. infrastructure are back, according to a report out today.

Why it matters: The resurgence shows that the Chinese government isn’t backing down from its quest to infiltrate American utilities in preparation for a potential destructive cyberattack.

Zoom in: The research team at SecurityScorecard, a cyber risk assessment company, says it has noticed Volt Typhoon moving traffic through a set of compromised routers in New Caledonia, an island nation off the coast of Australia, as recently as September.

  • Global law enforcement disrupted a significant portion of Volt Typhoon’s botnet in January, but the group quickly set up new servers.
  • However, actual movement across these servers hadn’t been seen until September, according to the report.
  • Routing through New Caledonia gives the hackers a “silent bridge” to hide traffic moving between the Asia-Pacific region and the Americas, the report says. Continue reading “Rising Threat of China’s Volt Typhoon”

Say Goodbye to Passwords

source: fastcompany.com  |  image: pixabay.com

 

Passkey adoption is up, and problems are being fixed.

It’s been a couple of years since Apple, Google, and Microsoft started trying to kill the password, and its demise seems more likely than ever.

In 2022, all three companies embraced an alternative called passkeys, which sync securely between your devices and are protected by face recognition, a fingerprint, or a PIN. The thinking goes that if you don’t have to remember a password—or even create one in a password manager—you’re less likely to fall prey to phishing scams. And if websites don’t have to store their customers’ passwords anymore, security breaches won’t be as disastrous. Continue reading “Say Goodbye to Passwords”

China’s Satellites Are Dodging US Eyes In Space

source: defenseone.com  |  image: pixabay.com

 

The Pentagon doesn’t post location data for its secretive GSSAP satellites, but Chinese spacecraft are maneuvering to avoid their gaze.

The Pentagon has long been closed-mouthed about a family of U.S. spy satellites that since 2014 have kept an eye on foreign spacecraft in geosynchronous orbits. That hasn’t stopped Chinese satellites from dodging them.

U.S. officials declassified the Geosynchronous Space Situational Awareness Program a decade ago to show that they had eyes on high-Earth orbit, but they have rarely discussed the the six GSSAP satellites themselves, and they do not publish the standard location data meant to reduce collisions. Now, a new paper from the U.S. Air Force’s China Aerospace Studies Institute explores what the Chinese know about GSSAP—and what they’re doing about it. Continue reading “China’s Satellites Are Dodging US Eyes In Space”

Cyberattackers Unleash Flood of Potentially Disruptive Election-Related Activity

source: darkreading.com  |  image: pexels.com

 

Cyber-threat actors have ramped up their targeting of the 2024 US electionswith a flood of malicious activity expected to peak over the next month, aimed at causing disruption to voters and the election process and requiring increased vigilance on the part of stakeholders.

Specifically, attackers have bolstered election-related threat activity since the beginning of the year with an increase in the sale of phishing kits targeting US voters and campaign donors; the registration of more than 1,000 domains aimed at exploiting election-related content for malicious purposes; and increased ransomware activity targeting government entities, according to research from FortiGuard Labs Threat Research released today.

Since the inception of Internet-related threats, cyber-threat actors have typically increased malicious activity ahead of elections, notes Derek Manky, chief security strategist and vice president of global threat intelligence at Fortinet. However, they aim to be especially disruptive during the current election cycle, requiring that all stakeholders be prepared to fend off malicious actors in the upcoming weeks to protect election outcomes. Continue reading “Cyberattackers Unleash Flood of Potentially Disruptive Election-Related Activity”

Did Israel Intercept Any Iranian Missiles?

source: https://joecirincione.substack.com (contributed by FAN, Bill Amshey)  |  image: pexels.com

The available evidence indicates that most of Iran’s missiles got through.

Something has been bothering me. Almost every reporter and Israeli official says that Israel intercepted most of the 180 missiles Iran fired at three Israeli military bases October 1. If that were true, then you would expect to see dozens of large explosions in the air as the Israeli Arrow 2 or Arrow 3 interceptors found their targets and destroyed the incoming warheads.

But that is not what you see. Dozens of videos show scores of missiles streaking across the sky with many hitting the ground and exploding in fireballs. There are numerous reports of substantial ground damage, including large craters, damaged buildings and at least one intact ballistic missile that failed to explode.

It appears that the Iranian missiles were so inaccurate that most landed a kilometer or more from their intended targets, with some landing in the sea or in vacant land. The Washington Post reports, in one of the few attempts to independently assess the damage, that, “Video recorded from the southern town of Ar’arat an-Naqab on Tuesday showed at least 20 projectiles flying through the air above the Nevatim military air base. At least six missiles hit the facility, erupting into fireballs; plumes of smoke rose from the airfield. No aircraft was hit, the Israel Defense Forces told Israeli media.” Continue reading “Did Israel Intercept Any Iranian Missiles?”

Chinese Hacking “Typhoons” Threaten U.S. Infrastructure

source: axios.com (contributed by FAN, Bill Amshey)  |  image: pexels.com

 

The Chinese government is running another broad campaign to hack as many American organizations as possible — heightening the threat across critical infrastructure.

Why it matters: The new hacking campaign suggests China could hold more expansive power to turn off key U.S. infrastructure than previously thought.

Driving the news: FBI director Christopher Wray said at the Aspen Cyber Summit on Wednesday that the bureau and its partners hijacked thousands of devices last week that a Chinese hacking group had infected with malware.

  • Flax Typhoon, a new China-backed hacking team, infected home routers, firewalls, storage devices, and Internet of Things devices like cameras and video recorders.

Zoom in: As of June, Flax Typhoon’s botnet included more than 260,000 malware-infected devices across North America, South America, Europe, Africa, Southeast Asia and Australia, according to a U.S. government advisory.

  • Half of the hijacked devices were located in the U.S., Wray said in his remarks.
  • Security researchers at Black Lotus Labs said in a coinciding report that hackers have used the botnet to target U.S. and Taiwanese organizations in the military, government, higher education, telecommunications, defense and IT sectors.
  • The FBI also alleged that the Flax Typhoon hackers worked for Integrity Technology Group, a Chinese tech company that does contract work for Beijing’s intelligence agencies.
  • The FBI also said that Integrity Technology Group operated and controlled the botnet. Continue reading “Chinese hacking “typhoons” threaten U.S. infrastructure”

Safeguarding Secrets From Quantum Spying

source: axios.com (contributed by FAN, Bill Amshey)  |  image: pexels.com

 

The National Institute of Standards and Technology has released its highly anticipated standards for protecting encrypted data from future quantum technologies.

Why it matters: China and other foreign foes are likely already collecting encrypted U.S. secrets with the hopes of breaking into them once quantum computing technology catches up.

What’s happening: NIST this week formally approved three post-quantum cryptography standards, marking an important first step in protecting government and critical services from encryption-breaking quantum.

  • IBM researchers developed two of the three standards in collaboration with industry and academic partners.
  • The third standard was developed by a researcher who has since joined IBM.
  • Apple, Meta, Google and some other companies are already implementing these standards.

What’s next: These standards will serve as a blueprint for governments and private-sector organizations around the world.

Go deeper.