Aww...that’s OK...but what are the Chinese doing about trans people? I mean...that’s what’s REALLY important!
That’s not good. Might be a reason for them handing out those satellite phones...LOL.
Taking down infrastructure and communication just before an attack is strategic.
And we are supposed to be all worried about Ukraine and Russia...
I guess we should count it as progress that we discover these kinds of thing 2 years after they’re invoked versus eight or ten years later.
It’s not a ‘hack’ if Biden gave them the passkeys................
Good thing Biden is effectively Chinese.
Did Biden get his usual 10% from this Chinese activity?
The article didn’t say.
Is it a hack if Biden allows it? Seriously MS, is this news?
If anyone wants on or off the Ping Me When the Internet Goes Down pinglist, kindly FReepmail me. Thanks!
CIA will save us!
An act of war.
Puppet Biden will do nothing.
How much money did Joe and his crime family make on that deal?
I’ve attended a bunch of Fed (three letter agency) briefings on foreign “state actors” attempting to compromise US critical systems. This goes back at least 15 years.
The quiet part was generally said privately - it has always been the Chinese behind it.
Elections have consequences.
Alas, security that depends on the expertise, diligence and loyalty of humans is bound to fail.
>>Volt Typhoon achieves initial access to targeted organizations through internet-facing Fortinet FortiGuard devices. Microsoft continues to investigate Volt Typhoon’s methods for gaining access to these devices.
>>The threat actor attempts to leverage any privileges afforded by the Fortinet device, extracts credentials to an Active Directory account used by the device, and then attempts to authenticate to other devices on the network with those credentials.
>>Volt Typhoon proxies all its network traffic to its targets through compromised SOHO network edge devices (including routers). Microsoft has confirmed that many of the devices, which include those manufactured by ASUS, Cisco, D-Link, NETGEAR, and Zyxel, allow the owner to expose HTTP or SSH management interfaces to the internet. Owners of network edge devices should ensure that management interfaces are not exposed to the public internet in order to reduce their attack surface. By proxying through these devices, Volt Typhoon enhances the stealth of their operations and lowers overhead costs for acquiring infrastructure.
This will be a never-ending struggle for us as well as them. For everyone.
I’m glad they caught this, but rest assured there is a lot more out there, every day, every hour, every minute.
And we are spying on them, and are trying to infiltrate, skew, mess up and dominate in cyberspace, just like everywhere else, as is everyone else.
And I even think it is justified, as they think the same.
Every system connected is a potential access point for all of this. However, the good and profit we get from these connected systems also has its weakness.
Be ever vigilant.
It isn’t espionage if the President of the USA works for you and is paid handsomely for the information
.
They are getting ready for the invasion of Taiwan.