Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Cyberwarfare and China

From Wikipedia, the free encyclopedia
(Redirected fromCyberwarfare in China)

Cyberwarfare is the strategic use of computer technology to disrupt the functions of a state or organization, specifically through the deliberate targeting of information systems for military or tactical purposes. In thePeople's Republic of China, it is related to the aggregate ofcyberattacks attributed to state organs and various relatedadvanced persistent threat (APT) groups.

Background

[edit]
These paragraphs are an excerpt fromCyberwarfare.[edit]

Cyberwarfare is the use ofcyber attacks against an enemystate, causing comparable harm to actualwarfare and/or disrupting vitalcomputer systems.[1] Some intended outcomes could beespionage,sabotage,propaganda,manipulation oreconomic warfare.

There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists.[2] One view is that the term is a misnomer since no cyber attacks to date could be described as a war.[3] An alternative view is that it is a suitable label for cyber attacks which cause physical damage to people and objects in the real world.[4]

Many countries, including theUnited States,United Kingdom,Russia,China,Israel,Iran, andNorth Korea,[5][6][7][8] have active cyber capabilities for offensive and defensive operations. As states explore the use of cyber operations and combine capabilities, the likelihood of physical confrontation and violence playing out as a result of, or part of, a cyber operation is increased. However, meeting the scale and protracted nature of war is unlikely, thus ambiguity remains.[9]

Development history

[edit]

In 1992, thePeople's Liberation Army stated that the United States was developing computer virus weapons.[10]: 187  According to the PLA journalForeign Military Arts, US computer virus weapons would have the potential to attack civilian targets and military targets.[10]: 192  The PLA observed that cyberattacks could have strategic impacts.[10]: 189 

During the 1999NATO bombing of Yugoslavia, theUnited States bombed the Chinese embassy in Belgrade.[10]: 16–17  The US stated that the bombing was accidental.[10]: 17  Chinese leadership believed that the US had intentionally bombed the embassy and viewed China as significantly lacking in leverage against the United States.[10]: 17  Among other efforts to reduce its gap in leverage, China sought to begin developing cyberwarfare capabilities.[10]: 17  In 2000,Jiang Zemin approved the development of cyber coercive capabilities.[10]: 187 

In a December 2000 speech to theCentral Military Commission (CMC), Jiang stated, "[I]nformation warfare is in the ascendant on the stage of warfare, with electronic network warfare and computer network warfare as the principle means."[10]: 191–192 

At the December 2002 CMC meeting, Jiang instructed the PLA to invest heavily in information warfare development and the PLA therefore established the All-Military InformatizationLeading Small Group to coordinate this development.[10]: 210–211 

When he became Chairman of the CMC in 2004,Hu Jintao instructed the PLA to engage in a "new historic mission" to defend China's interests in the electromagnetic (and space) domains.[10]: 213 

Chinese leadership perceived that China was at an increasing risk of cyber threats from abroad.[10]: 211  This perception was shaped from 2000 to 2010 by the early 2000scolor revolutions, the Russiancyberattacks during the2008 Russo-Georgian war, and theUS-Israel Stuxnet cyberattack on Iran.[10]: 211  The2010s surveillance disclosures byEdward Snowden about the extent of US global surveillance programs also highlighted to Chinese leadership the risks the country faced through its reliance on foreign hardware, software, and internet infrastructure.[10]: 211 

The PLA's first cyberblue team was established inGuangzhou Military Region in May 2011 to test regular PLA unit's cyber defenses.[10]: 202 

At the18th National Congress of the Chinese Communist Party, Hu Jintao stated China should "implement the military strategy of active defense for the new period, and enhance military strategic guidance as the times so require. We should attach great importance to maritime, space, and cybersecurity."[10]: 279 

As part of its response to theUnited States intelligence activities in China demonstrated through the Snowden disclosures, the CCP in 2014 formed theCybersecurity and Information Leading Group and theNational People's Congress passed the 2017Cyber Security Law.[11]: 129, 250  Under thegeneral secretaryship of Xi Jinping, the Chinese government has sponsored regular hacking competitions to identify top talent for state recruitment and, since 2018, has legally required allvulnerabilities discovered to be reported solely to theMinistry of Industry and Information Technology.[12][13] In 2018, Chinese nationals stopped participating in international hacking competitions.[12][14]

During the NewGutian Conference, Xi Jinping stated that cyber conflict was one of the main areas of military competition for the PLA and described the PLA as needing to overcome its "ostrich" attitude and rigid ways of thinking in this area.[10]: 232  According to Xi's remarks, "Currently some work is not at all suitable for the requirements of the cyber era, and it is already increasingly clear that ideas and concepts and work methods are lacking in this age".[10]: 232 

In a 2016 cybersecurity speech, Xi stated that government, the PLA, and private enterprise should acquire cyber technology at the level of its rivals and that China needed to develop a "situational awareness posture at all times and in all locations".[10]: 219  Xi stated that "if others use air strikes and we are still using swords and spears, that is unacceptable; offensive and defensive capabilities must be symmetrical."[10]: 219  In 2019, he stated that China "continues to advance in the direction of balancing offensive and defensive cyber power" and that the country's "cyber-security deterrence capability to strike back continues to grow."[10]: 219–220 

In 2020, a Chinese cybersecurity firm,Qihoo 360, publicly claimed that a cyber espionage campaign was attributed to theCentral Intelligence Agency.[10]: 220–221  In a December 2024 meeting, a Chinese Ministry of Foreign Affairs official stated that Chinese cyberattacks against U.S. infrastructure are a response toAmerican policies toward Taiwan.[15]

Academic Fiona Cunningham writes that while it has targeted U.S. critical infrastructure withVolt Typhoon, as of mid-2024, there have been no public reports of a Chinese cyberattack with a scope similar to the United States-IsraelStuxnet cyberattack on Iran, or theRussian cyberattacks on Ukraine's power grid).[10]: 228 

Organization

[edit]

While some details remain unconfirmed, it is understood that China organizes its resources as follows:

  • “Specialized military network warfare forces” (Chinese:军队专业网络战力量) - Military units specialized in network attack and defense.
  • "PLA-authorized forces” (授权力量) - network warfare specialists in theMinistry of State Security (MSS) and theMinistry of Public Security (MPS).
  • “Non-governmental forces” (民间力量) - civilian and semi-civilian[definition needed] groups that spontaneously engage in network attack and defense.[16]

In response to claims that Chinese universities, businesses, and politicians have been subject to cyber espionage by theUnited StatesNational Security Agency since 2009,[17][18] the PLA announced a cyber security squad in May 2011 to defend their own networks.[19]

Since Xi becameGeneral Secretary of theChinese Communist Party in 2012, the Ministry of State Security (MSS) gained more responsibility overcyberespionage compared with the PLA, and currently oversees variousadvanced persistent threats.[20] According to security researcher Timo Steffens, advanced persistent threat (APT) groups in China leverage skills from private as well as public institutions and individuals, including smaller companies and hackers that take on government contracts.[21]

On 31 December 2015, the PLA established theStrategic Support Force (PLASSF).[10]: 224  The PLASSF combined PLA cyber units from various PLA bodies into theNetwork Systems Department which included cyber intelligence, defense, and attack capabilities.[10]: 224  In April 2024, the PLASSF was dissolved and its cyberwarfare capabilities and personnel were transferred to the newly createdPeople's Liberation Army Cyberspace Force.[22]

In 2017,Foreign Policy estimated China's "hacker army" personnel at between 50,000 and 100,000 individuals.[23]

List of related APTs

[edit]
This section is an excerpt fromAdvanced persistent threat § China.[edit]

Allegations of espionage and cyber-attacks

[edit]
See also:Chinese intelligence activity abroad,Allegations of intellectual property theft by China, andChinese information operations and information warfare

African Union

[edit]
Further information:2018 China–African Union espionage allegations

In 2020, Japan'sComputer Emergency Response Team (CERT) reported that a suspected Chinese hacking organization dubbed "Bronze President" had hacked and extracted footage from the AU Headquarters' security cameras.[59]

ASEAN

[edit]

In 2022, Chinese state-affiliated hackers compromised the email system of theASEAN Secretariat.[60][61]

Australia

[edit]

In May 2013,ABC News claimed that the Chinese government stole blueprints to the headquarters of theAustralian Security Intelligence Organisation (ASIO).[62] In May 2023, Australia, alongside otherFive Eyes member states, identified the Chinese government behind the "Volt Typhoon"advanced persistent threat targeting critical infrastructure.[63] In July 2024, government agencies from eight nations, including theAustralian Signals Directorate, released a joint advisory on APT40.[64][65]

Belgium

[edit]

In April 2024, the BelgianForeign Ministry summoned the Chinese envoy after reports emerged that Chinese spies (APT31) hacked the laptops of key lawmakers such as the head of the Belgian Foreign Affairs Committee and former prime ministerGuy Verhofstadt.[66][67][68]

Brazil

[edit]

In 2022, a Chinese advanced persistent threat called ChamelGang, or CamoFei, attacked thepresidency of Brazil in a cyber-espionage operation that used ransomware as acover, according to a report bySentinelOne andRecorded Future.[69][70]

Canada

[edit]
Further information:2011 Canadian government hackings andChinese government interference in Canada

Officials in theCanadian government claimed that Chinese hackers compromised several departments within the federal government inearly 2011, though the Chinese government has denied involvement.[71] In 2014, Canada's Chief Information Officer claimed that Chinese hackers compromised computer systems within theNational Research Council.[72] In May 2023, Canada'sCommunications Security Establishment identified the Chinese government as being behind the "Volt Typhoon" advanced persistent threat targeting critical infrastructure.[73] In July 2024, government agencies from eight nations, including the Canadian Centre for Cyber Security, released a joint advisory on APT40.[64][65]

Czech Republic

[edit]

In 2021, CzechMinister of Foreign AffairsJan Lipavský was targeted in a Chinese cyberespionage campaign by the Ministry of State Security's APT31 group.[74] In response, Lipavský stated "[t]his just proves the assessment in our Security Strategy, which states that the rising assertiveness of China is a systemic challenge that needs to be dealt with in coordination with our trans-Atlantic allies."[74] In May 2025, the CzechMinistry of Foreign Affairs stated that it was targeted by APT31, saying that "[s]uch behavior undermines the credibility of the People’s Republic of China and contradicts its public declarations."[75]

Denmark

[edit]

In March 2025, Denmark's Centre for Cyber Security (CFCS) stated that the Danish telecom sector was being actively targeted by state-backed hackers from China.[76][77]

Finland

[edit]

In March 2021, theFinnish Security and Intelligence Service said China's APT31 had targeted the country's parliament in a cyber attack.[78] In March 2024, Finnish police confirmed that APT31 breached theParliament of Finland in March 2021.[79]

France

[edit]

In May 2024, several French lawmakers, all belonging to theInter-Parliamentary Alliance on China (IPAC), revealed that they had been targeted by China's APT31.[80]

Germany

[edit]

In July 2024, government agencies from eight nations, including Germany'sFederal Intelligence Service andFederal Office for the Protection of the Constitution, released a joint advisory on APT40.[64][65]

India

[edit]

Officials in theIndian government believe that attacks on Indian government networks, such as the attack on the IndianNational Security Council, have originated from China. According to the Indian government, Chinese hackers are experts in operatingbotnets, which were used in these attacks.[81] Additionally, other instances of Chinesecyberattacks against India's cyberspace have been reported in multitude.[82][83]

Indonesia

[edit]

In 2021, Indonesia'sState Intelligence Agency (BIN), and other government institutions were reported to have been targeted by Mustang Panda, a China-based advanced persistent threat actor.[84] BIN subsequently denied any compromise of their computer systems.[85]

Israel

[edit]

Starting in 2019, Chinese state-sponsored espionage group UNC215 targeted Israeli government institutions, IT providers, and telecommunication firms in a series of attacks that attempted to disguise themselves as Iranian hackers.[86][87]

Italy

[edit]

In July 2025, a hacker allegedly working withHafnium, Xu Zewei, was arrested in Milan.[88]

Japan

[edit]

In April 2021, Japan claimed that the Chinese military ordered cyberattacks on about 200 Japanese companies and research institutes, includingJAXA.[89] In July 2024, government agencies from eight nations, including Japan'sNational Police Agency, released a joint advisory on APT40.[64][65]

Kazakhstan

[edit]

In March 2024, Kazakhstan’s National Computer Emergency Response Team reported that Chinese state-backed hackers accessed the country'sMinistry of Defense, telecommunications networks, and other critical infrastructure since at least two years prior.[90]

Lithuania

[edit]

In April 2024, two Lithuanian lawmakers belonging to theInter-Parliamentary Alliance on China (IPAC) were reported to have been targeted by APT31.[91]

The Netherlands

[edit]

In 2024, theDutch Military Intelligence and Security Service and theGeneral Intelligence and Security Service stated that Chinese state hackers penetrated a Dutch military network the prior year.[92]

New Zealand

[edit]
See also:Foreign espionage in New Zealand § China

In May 2023, New Zealand, alongside other Five Eyes member states, named the Chinese government as being behind the "Volt Typhoon" advanced persistent threat targeting critical infrastructure.[93] In March 2024, theGovernment Communications Security Bureau and New Zealand Government accused the Chinese government viaAPT40 of breaching its parliamentary network in 2021.[94] In July 2024, government agencies from eight nations, including the New ZealandNational Cyber Security Centre, released a joint advisory on APT40.[64][65]

Norway

[edit]

In 2018, Norway's private IT infrastructure was penetrated by China's Ministry of State Security-linked hacking group APT31.[95] Norwegian parliamentary email accounts were breached by Chinese state hackers during the2021 Microsoft Exchange Server data breach.[96]

Paraguay

[edit]

In 2024, Flax Typhoon, an advanced persistent threat linked to the Chinese state, was found to have infiltrated Paraguayan government networks.[97][98]

Philippines

[edit]

In the run-up the2025 Philippine general election, theNational Intelligence Coordinating Agency (NICA) stated that Chinese government agents undertook onlineinfluence operations in coordination with local proxies. NICA alleged that the Chinese embassy in Manila paid for atroll farm onFacebook andTwitter to spread disinformation and promote Chinese state interests.[99][100][101]

Russia

[edit]

In June 2025, a leaked internal RussianFSB memo raised concerns about China with respect toindustrial espionage of sensitive Russian technologies.[102] Information on Russia's weaponry has increasingly been targeted by advanced persistent threats emanating from China.[103]

Singapore

[edit]

In July 2025,K. Shanmugam, Singapore'sCoordinating Minister for National Security, stated that the country's critical infrastructure was attacked by UNC3886, a cyber-espionage group linked to China.[104][105]

South Korea

[edit]

In July 2024, government agencies from eight nations, including South Korea'sNational Intelligence Service, released a joint advisory on APT40.[64][65] In 2025,SK Telecom was reported to be affected by attacks from China-based hacking group Red Menshen.[106][107]

United States

[edit]
See also:Chinese espionage in the United States,Operation Aurora,Titan Rain, andBeijing–Washington cyber hotline

The United States has accused China of cyberwarfare attacks that targeted the networks of important American military, commercial, research, and industrial organizations. A Congressional advisory group has declared China "the single greatest risk to the security of American technologies"[108] and "there has been a marked increase in cyber intrusions originating in China and targeting U.S. government and defense-related computer systems".[108][109][110][111] China's cyberwarfare has expanded from cyber-espionage to "pre-positioning" activity for the sabotage and crippling of critical infrastructure.[112] From 2023 to 2024, hacks originating from Chinese state-sponsored actors doubled to over 330.[113]

In January 2010,Google reported targetedattacks on its corporate infrastructure originating from China "that resulted in the theft of intellectual property from Google."Gmail accounts belonging to twohuman rights activists were compromised in an attack on Google's password system.[114] Chinese hackers also gained access to adatabase containingclassified information about suspected spies, agents, and terrorists under surveillance by the US government.[115] American security experts connected the Google attack to various other political and corporate espionage efforts originating from China, which included spying against military, commercial, research, and industrial corporations.[111]Obama administration officials called the cyberattacks "an increasingly serious cyber threat to US critical industries."[109]

In addition to Google, at least 34 other companies have been attacked. Reported cases includeNorthrop Grumman,Symantec,Yahoo,Dow Chemical, andAdobe Systems.[116] Cyber-espionage has been aimed at both commercial and military interests.[117]

Diplomatic cables highlight US concerns that China is exploiting its access to Microsoft source code to boost its offensive and defensive capabilities.[118]

A number of private computer security firms have stated that they have growing evidence of cyber-espionage efforts originating from China, including the "Comment Group".[119]

China has denied accusations of cyberwarfare,[120] and has accusedthe United States of engaging in cyber-warfare against it, accusations which the United States denies.[121][122][123][124][125]

During 18 minutes on April 8, 2010, state-ownedChina Telecom advertised erroneous network routes that instructed "massive volumes" of U.S. and other foreign Internet traffic to go through Chinese servers. A US Defense Department spokesman told reporters that he did not know if "we've determined whether that particular incident ... was done with some malicious intent or not" and China Telecom denied the charge that it "hijacked" U.S. Internet traffic.[126]

In 2011, a Chinese state TV program displayed outdated screenshots of a Chinese military institute performing cyber attacks on a US-based dissident entity.[127] The direct visual evidence from an official Chinese source challenges China's claims that it never engages in overseas hacking for government purposes.[127]

During March 2013, high-level discussions continued.[128]

In May 2014, a federalgrand jury in the United Statesindicted fivePLA Unit 61398 officers on charges of theft of confidential business information from U.S. commercial firms and plantingmalware on their computers.[129][130] To Chinese experts, the charges demonstrated the sophistication of the United States ability to attribute cyberattacks.[10]: 212 

In September 2014, aSenate Armed Services Committee probe revealed hackers associated with the Chinese government committing various intrusions of computer systems belonging to U.S. airlines, technology companies and other contractors involved with the movement of U.S. troops and military equipment,[131] and in October 2014, The FBI added that hackers, who they believe to be backed by the Chinese government, have recently launched attacks on U.S. companies.[132]

In 2015, theU.S. Office of Personnel Management (OPM) announced that it had been the target of adata breach targeting the records of as many as 21.5 million people.[133]The Washington Post reported that the attack came from China, citing unnamed government officials.[134]FBI directorJames Comey explained "it is a very big deal from a national security perspective and a counterintelligence perspective. It's a treasure trove of information about everybody who has worked for, tried to work for, or works for the United States government."[135]

In October 2018,Bloomberg Businessweek published a report, citing unnamed corporate and governmental sources, which claimed that the PLA had forcedSupermicro's Chinese sub-contractors to add microchips with hardware backdoors to its servers. The report claimed that the compromised servers had been sold to U.S. government agencies (including the CIA and Department of Defense) and contractors and at least 30 commercial clients.[136]

In 2019, a study showed continued attacks on the US Navy and its industrial partners.[137]

In 2020, as the coronavirus spread globally, intelligence agencies—including China’s—reportedly turned to hacking to gather information on vaccine development. That May, theFederal Bureau of Investigation and CISA publicly accused China-linked cyber actors of targeting U.S. institutions to steal COVID-19 research and health data.[138]

In February 2020, a US federal grand jury charged four members of the PLA with the2017 Equifax hack.[139] The official account of FBI stated on Twitter that they played a role in "one of the largest thefts of personally identifiable information by state-sponsored hackers ever recorded".[140]

TheVoice of America reported in April 2020 that "U.S. intelligence agencies concluded the Chinese hackers meddled in both the 2016 and 2018 elections" and said "there have already been signs that China-allied hackers have engaged in so-called "spear-phishing" attacks on American political targets" ahead of the2020 United States elections.[141]

In March 2021,United States intelligence community released analysis in finding that China had considered interfering with the election but decided against it on concerns it would fail or backfire.[142]

In April 2021,FireEye said that suspected Chinese hackers used a zero-day attack against Pulse Connect Secure devices, a VPN device, in order to spy on dozens of government, defense industry and financial targets in the U.S. and Europe.[143][144][145][146]

In May 2023,Microsoft and Western intelligence agencies reported that a Chinese state-sponsored hacking group affiliated with the PLA called "Volt Typhoon" had targeted critical infrastructure and military installations inGuam, Hawaii, Texas and elsewhere.[147][148][149] In January 2024, US authorities stated that they disrupted an operation by Volt Typhoon that had access to critical infrastructure in the US for at least five years.[150][151]

In February 2024,OpenAI announced that it had shut down accounts used by the Charcoal Typhoon and Salmon Typhoon hacking groups. The groups had been using their services to research companies, intelligence agencies, cybersecurity tools and evasion techniques, translate technical papers, write and refactor code, and create phishing campaign content.[152][153] The same month, leaked documents from an MSS, PLA, and MPS contractor based in Shanghai calledI-Soon, also known as Auxun, provided details into a campaign to harassdissidents, activists, critical academics, andUyghurs overseas.[154][155][156]

In July 2024, government agencies from eight nations, including the United States National Security Agency andCybersecurity and Infrastructure Security Agency, released a joint advisory on APT40.[64][65] In September 2024, FBI directorChristopher A. Wray announced that Chinese state hacking campaign known as Flax Typhoon, which targeted critical infrastructure, had been disrupted.[157][158]

In October 2024, backdoors mandated by the 1994Communications Assistance for Law Enforcement Act, which forces internet providers to provide backdoors for government authorities,[159][160] were found to have been employed by China to tap communications in the U.S. using that infrastructure for months, or perhaps longer;[161] China recorded presidential candidate campaign office phone calls —including employees of the then-vice president of the nation– and of the candidates themselves.[162]

In November 2024, Texas governorGreg Abbott ordered state agencies to harden critical infrastructure from cyberattacks from threats emanating from the PRC.[163] In December 2024, the U.S. moved to crack down on China Telecom's cloud operations in the U.S. in response to the2024 United States telecommunications hack.[164] The same month, Chinese state-backed hackers were accused of obtaining a security key and accessing unclassified documents of theUnited States Department of the Treasury.[165][166] In December 2024, theOffice of Foreign Assets Control (OFAC) sanctioned the Integrity Technology Group, an organization believed to be behind the Flax Typhoon APT.[167][168]

In January 2025, the computers of theUS Secretary of the Treasury and several of her lieutenants were accessed by Chinese hackers.[169] In March 2025, theU.S. Department of Justice indicted 10 Chinese nationals who worked for MPS or its contractor I-Soon, also known as Auxun Information Technology.[170] A 2025Czech Technical University study found that multiple Chinese academics have produced studies on how to optimally target U.S. electric grids.[113] In July 2025, theNational Nuclear Security Administration was reported to have breached by Chinese state-sponsored advanced persistent threat groups dubbed Linen Typhoon, Violet Typhoon and Storm-2603.[171]

Taiwan

[edit]

Comparing the semiconductor industry in China mainland and Taiwan today, Taiwan is the leader in terms of overall competitiveness. On 6 August 2020,Wired published a report, stating that "Taiwan has faced existential conflict with China for its entire existence and has been targeted by China's state-sponsored hackers for years. But an investigation by one Taiwanese security firm has revealed just how deeply a single group of Chinese hackers was able to penetrate an industry at the core of the Taiwanese economy, pillaging practically its entire semiconductor industry."[172]

In 2025,Proofpoint published a report stating that China-linked hackers have targeted Taiwanese microchip companies such asTSMC,MediaTek,United Microelectronics Corporation,Nanya Technology, andRealtek with sustained campaigns.[173]

Turkey

[edit]

In May 2025, theTurkish National Intelligence Organization (MIT) reportedly dismantled a Chinese cyber-espionage cell in Istanbul, accused of using ghost base stations to collect communication data and user information and conduct surveillance of Turkish public officials and Uyghur Turks.[174]

Ukraine

[edit]

In April 2022,The Times reported that days prior to the start of the2022 Russian invasion of Ukraine, a cyberwarfare unit of the PLA launched cyberattacks against hundreds of Ukrainian government sites, according to officials of theSecurity Service of Ukraine.[175][176]

United Kingdom

[edit]

In May 2023, the UK'sNational Cyber Security Centre, alongside other Five Eyes member states, identified the Chinese government behind the "Volt Typhoon" advanced persistent threat targeting critical infrastructure.[63][177]

In March 2024, the UK government and the United States Department of the Treasury's Office of Foreign Assets Control (OFAC) jointly sanctioned a Chinese MSS front company called Wuhan Xiaoruizhi Science and Technology and affiliated individuals forbreaching theElectoral Commission and placing malware in critical infrastructure.[178][179]

In July 2024, government agencies from eight nations, including the UK's National Cyber Security Centre, released a joint advisory on APT40.[64][65]

The Vatican

[edit]
Further information:China–Holy See relations

In July 2020, it was reported that Chinese state-sponsored hackers operating under the named RedDelta hacked the Vatican's computer network ahead of negotiations between China and the Vatican.[180]

Vietnam

[edit]

In 2012, Chinese state-sponsored hackers attackedPetroVietnam,Vietnam News Agency, andVietnam Post. During theHai Yang Shi You 981 standoff in 2014, multiple Vietnamese government websites were attacked by Chinese hackers.[181] In 2016, following theSouth China Sea Arbitration ruling, multipleVietnamese airports were hacked.[181][182] In 2020, Vietnamese government officials were targeted inphishing campaigns by the China-based state-sponsored hacking group Pirate Panda.[183] In 2023, Vietnam publicly named several Chinese advanced persistent threat groups targeting it.[182]

See also

[edit]

References

[edit]
  1. ^Singer, P. W.; Friedman, Allan (March 2014).Cybersecurity and cyberwar: what everyone needs to know. Oxford University Press.ISBN 978-0-19-991809-6.OCLC 802324804.
  2. ^"Cyberwar – does it exist?".NATO. June 13, 2019. RetrievedMay 10, 2019.
  3. ^Smith, Troy E. (2013). "Cyber Warfare: A Misrepresentation of the True Cyber Threat".American Intelligence Journal.31 (1):82–85.ISSN 0883-072X.JSTOR 26202046.
  4. ^Lucas, George (2017).Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare. Oxford University Press. p. 6.ISBN 978-0-19-027652-2.
  5. ^"Advanced Persistent Threat Groups".FireEye. RetrievedMay 10, 2019.
  6. ^"APT trends report Q1 2019".securelist.com. April 30, 2019. RetrievedMay 10, 2019.
  7. ^"GCHQ".www.gchq.gov.uk. RetrievedMay 10, 2019.
  8. ^"Who are the cyberwar superpowers?".World Economic Forum. May 4, 2016. RetrievedJune 24, 2021.
  9. ^Green, James A., ed. (November 7, 2016).Cyber warfare: a multidisciplinary analysis. London: Routledge.ISBN 978-0-415-78707-9.OCLC 980939904.
  10. ^abcdefghijklmnopqrstuvwxyzCunningham, Fiona S. (2025).Under the Nuclear Shadow: China's Information-Age Weapons in International Security.Princeton University Press.doi:10.2307/jj.16040335.ISBN 978-0-691-26103-4.JSTOR jj.16040335.
  11. ^Zhang, Angela Huyue (2024).High Wire: How China Regulates Big Tech and Governs Its Economy.Oxford University Press.doi:10.1093/oso/9780197682258.001.0001.ISBN 9780197682258.
  12. ^abTarabay, Jamie (April 30, 2025)."Chinese Hacking Competitions Fuel the Country's Broad Cyber Ambitions".Bloomberg News. RetrievedMay 18, 2025.
  13. ^"Translation: Notice on Regulating the Promotion of Cybersecurity Competitions".Center for Security and Emerging Technology. June 5, 2018. RetrievedMay 19, 2025.
  14. ^Yang, Yingzhi (March 21, 2018)."No foreign hacking contests for China's top talent - so they don't help others".South China Morning Post.Archived from the original on May 6, 2025. RetrievedMay 19, 2025.
  15. ^Volz, Dustin (April 10, 2025)."In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks".The Wall Street Journal. RetrievedApril 13, 2025.
  16. ^Beijing, Simon Elegant (November 18, 2009)."Cyberwarfare: The Issue China Won't Touch".Time. RetrievedOctober 7, 2024.
  17. ^Chan, Kelvin (June 13, 2013)."Leaker Snowden alleges NSA hacking on China, world".Phys.org.Associated Press.Archived from the original on November 25, 2020. RetrievedJuly 14, 2024.
  18. ^"Snowden says U.S. hacking targets China; NSA points to thwarted attacks".The Japan Times. June 14, 2013.Archived from the original on June 15, 2013. RetrievedJune 13, 2013.
  19. ^Beech, Hannah (May 27, 2011)."Meet China's Newest Soldiers: An Online Blue Army".Time.ISSN 0040-781X.Archived from the original on September 27, 2024. RetrievedOctober 7, 2024.
  20. ^Mozur, Paul; Buckley, Chris (August 26, 2021)."Spies for Hire: China's New Breed of Hackers Blends Espionage and Entrepreneurship".The New York Times.ISSN 0362-4331.Archived from the original on August 27, 2021. RetrievedAugust 27, 2021.
  21. ^Stone, Jeff (October 5, 2020)."Foreign spies use front companies to disguise their hacking, borrowing an old camouflage tactic".cyberscoop.com. Cyberscoop.Archived from the original on March 22, 2021. RetrievedOctober 11, 2020.In China not all of these companies are 'front companies' in the strict sense that they were established by intelligence agencies to hide their involvement. The APT landscape in China is run in a 'whole country' approach, leveraging skills from universities, individual, and private and public sectors. So some of the smaller companies might just be a way for individual hackers to band together and be eligible for government contracts.
  22. ^Arthur, Gordon (April 23, 2024)."China dissolves Strategic Support Force, focused on cyber and space".Defense News. RetrievedMarch 15, 2025.
  23. ^Hvistendahl, Mara (October 7, 2024)."China's Hacker Army".Foreign Policy.Archived from the original on March 9, 2017. RetrievedOctober 7, 2024.
  24. ^"Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak".Symantec. May 7, 2019.Archived from the original on May 7, 2019. RetrievedJuly 23, 2019.
  25. ^Cimpanu, Catalin (December 5, 2021)."Microsoft seizes domains used by Chinese cyber-espionage group Nickel (APT15)".therecord.media.Recorded Future. RetrievedOctober 7, 2025.
  26. ^"APT17: Hiding in Plain Sight - FireEye and Microsoft Expose Obfuscation Tactic"(PDF).FireEye. May 2015.Archived(PDF) from the original on November 24, 2023. RetrievedJanuary 21, 2024.
  27. ^"China-Based Threat Actors"(PDF).U.S. Department of Health and Human Services Office of Information Security. August 16, 2023.Archived(PDF) from the original on December 29, 2023. RetrievedApril 29, 2024.
  28. ^van Dantzig, Maarten; Schamper, Erik (December 19, 2019)."Wocao APT20"(PDF).fox-it.com.NCC Group. Archived fromthe original(PDF) on March 22, 2021. RetrievedDecember 23, 2019.
  29. ^Vijayan, Jai (December 19, 2019)."China-Based Cyber Espionage Group Targeting Orgs in 10 Countries".www.darkreading.com. Dark Reading.Archived from the original on May 7, 2021. RetrievedJanuary 12, 2020.
  30. ^Barth, Bradley (March 16, 2016)."'Suckfly' in the ointment: Chinese APT group steals code-signing certificates".SC Media.Archived from the original on September 24, 2024. RetrievedSeptember 24, 2024.
  31. ^"Building China's Comac C919 airplane involved a lot of hacking, report says".ZDNET.Archived from the original on November 15, 2019. RetrievedSeptember 24, 2024.
  32. ^Lyngaas, Sean (August 10, 2021)."Chinese hackers posed as Iranians to breach Israeli targets, FireEye says".www.cyberscoop.com.Archived from the original on November 29, 2023. RetrievedAugust 15, 2021.
  33. ^Lyngaas, Sean (February 12, 2019)."Right country, wrong group? Researchers say it wasn't APT10 that hacked Norwegian software firm".www.cyberscoop.com. Cyberscoop.Archived from the original on May 7, 2021. RetrievedOctober 16, 2020.
  34. ^Lyngaas, Sean (October 16, 2020)."Google offers details on Chinese hacking group that targeted Biden campaign".Cyberscoop.Archived from the original on May 7, 2021. RetrievedOctober 16, 2020.
  35. ^"How Microsoft names threat actors". Microsoft. January 16, 2024.Archived from the original on July 10, 2024. RetrievedJanuary 21, 2024.
  36. ^"Treasury Sanctions China-Linked Hackers for Targeting U.S. Critical Infrastructure".U.S. Department of the Treasury. March 19, 2024.Archived from the original on March 25, 2024. RetrievedMarch 25, 2024.
  37. ^"Double Dragon APT41, a dual espionage and cyber crime operation".FireEye. October 16, 2019. Archived fromthe original on May 7, 2021. RetrievedApril 14, 2020.
  38. ^"Bureau names ransomware culprits".Taipei Times. May 17, 2020.Archived from the original on March 22, 2021. RetrievedMay 22, 2020.
  39. ^Greenberg, Andy (August 6, 2020)."Chinese Hackers Have Pillaged Taiwan's Semiconductor Industry".Wired.ISSN 1059-1028.Archived from the original on March 22, 2021. RetrievedJuly 14, 2024.
  40. ^Sabin, Sam (October 26, 2022)."New pro-China disinformation campaign targets 2022 elections: Report".Axios.Archived from the original on October 26, 2022. RetrievedOctober 27, 2022.
  41. ^Milmo, Dan (April 5, 2024)."China will use AI to disrupt elections in the US, South Korea and India, Microsoft warns".The Guardian.ISSN 0261-3077.Archived from the original on May 25, 2024. RetrievedApril 7, 2024.
  42. ^Naraine, Ryan (March 2, 2021)."Microsoft: Multiple Exchange Server Zero-Days Under Attack by Chinese Hacking Group".securityweek.com. Wired Business Media.Archived from the original on July 6, 2023. RetrievedMarch 3, 2021.
  43. ^Burt, Tom (March 2, 2021)."New nation-state cyberattacks".blogs.microsoft.com. Microsoft.Archived from the original on March 2, 2021. RetrievedMarch 3, 2021.
  44. ^Nichols, Shaun (October 20, 2021)."'LightBasin' hackers spent 5 years hiding on telco networks".TechTarget.Archived from the original on November 29, 2023. RetrievedApril 8, 2022.
  45. ^Ilascu, Ionut (October 19, 2021)."LightBasin hacking group breaches 13 global telecoms in two years".Bleeping Computer.Archived from the original on July 24, 2023. RetrievedApril 8, 2022.
  46. ^Cimpanu, Catalin."Hackers target the air-gapped networks of the Taiwanese and Philippine military".ZDnet.Archived from the original on March 22, 2021. RetrievedMay 16, 2020.
  47. ^Intelligence, Microsoft Threat (May 24, 2023)."Volt Typhoon targets US critical infrastructure with living-off-the-land techniques".Microsoft Security Blog.Archived from the original on January 17, 2024. RetrievedMay 26, 2023.
  48. ^Tucker, Eric (September 18, 2024)."FBI disrupts Chinese cyber operation targeting critical infrastructure in the US".Associated Press.Archived from the original on September 24, 2024. RetrievedSeptember 18, 2024.
  49. ^ab"Disrupting malicious uses of AI by state-affiliated threat actors". February 14, 2024.Archived from the original on February 16, 2024. RetrievedFebruary 16, 2024.
  50. ^ab"Staying ahead of threat actors in the age of AI".Microsoft. February 14, 2024.Archived from the original on February 16, 2024. RetrievedFebruary 16, 2024.
  51. ^Krouse, Sarah; McMillan, Robert; Volz, Dustin (September 25, 2024)."China-Linked Hackers Breach U.S. Internet Providers in New 'Salt Typhoon' Cyberattack".The Wall Street Journal.Archived from the original on October 7, 2024. RetrievedSeptember 25, 2024.
  52. ^Krouse, Sarah; Volz, Dustin; Viswanatha, Aruna; McMillan, Robert (October 5, 2024)."U.S. Wiretap Systems Targeted in China-Linked Hack".The Wall Street Journal.Archived from the original on October 5, 2024. RetrievedOctober 5, 2024.
  53. ^Sabin, Sam (November 19, 2024)."New China-linked telco attackers".Axios. RetrievedNovember 19, 2024.
  54. ^Yamaguchi, Mari (January 8, 2025)."Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data".Associated Press.Archived from the original on January 8, 2025. RetrievedJanuary 8, 2025.
  55. ^Rajagopalan, Megha (June 19, 2025)."China Is Hacking Russia to Steal War Secrets".The New York Times.ISSN 0362-4331. RetrievedJune 20, 2025.
  56. ^"What is UNC3886, the group that attacked Singapore's critical information infrastructure?".The Straits Times. July 18, 2025.ISSN 0585-3923. RetrievedJuly 19, 2025.
  57. ^Kapko, Matt (September 30, 2025)."Palo Alto Networks spots new China espionage group showcasing advanced skills".CyberScoop. RetrievedSeptember 30, 2025.
  58. ^Sirico, Greg (September 30, 2025)."China's 'Phantom Taurus' Hacks Middle East".www.govinfosecurity.com. RetrievedSeptember 30, 2025.
  59. ^Satter, Raphael (December 16, 2020)."Suspected Chinese hackers stole camera footage from African Union - memo".Reuters. Archived fromthe original on December 19, 2020.
  60. ^"Analyst: China-linked hackers stole gigabytes of data from ASEAN servers".BenarNews. March 2, 2023.Archived from the original on June 25, 2025. RetrievedJuly 20, 2025.
  61. ^Burgess, Matt."China Is Relentlessly Hacking Its Neighbors".Wired.ISSN 1059-1028. RetrievedJuly 20, 2025.
  62. ^"George Brandis briefed by ASIO on claims China stole classified blueprints of Canberra headquarters".ABC News. May 29, 2013.Archived from the original on May 30, 2013. RetrievedMay 29, 2013.
  63. ^abEvans, Jake (May 24, 2023)."Australia joins intelligence partners to blame China for US infrastructure cyber attack".ABC News.Archived from the original on January 12, 2024. RetrievedJanuary 12, 2024.
  64. ^abcdefghCherney, Mike (July 9, 2024)."U.S., Allies Issue Rare Warning on Chinese Hacking Group".The Wall Street Journal.Archived from the original on July 9, 2024. RetrievedJuly 9, 2024.
  65. ^abcdefgh"Australia accuses China of cyber espionage".Voice of America. July 10, 2024.Archived from the original on July 10, 2024. RetrievedJuly 10, 2024.
  66. ^"Belgium to summon Chinese envoy after allegations of cyberattack on lawmakers".Anadolu Agency. April 25, 2024.Archived from the original on April 25, 2024. RetrievedApril 25, 2024.
  67. ^"Head of Belgian Foreign Affairs Committee says she was hacked by China".Reuters. April 25, 2024. RetrievedApril 25, 2024.
  68. ^Roussi, Antoaneta; Haeck, Pieter (April 29, 2024)."Ex-Belgian PM Guy Verhofstadt was a victim of Chinese hacking".Politico.Archived from the original on April 29, 2024. RetrievedApril 30, 2024.
  69. ^Vicens, A. J. (June 26, 2024)."Chinese hackers are increasingly deploying ransomware, researchers say".CyberScoop.Archived from the original on July 16, 2025. RetrievedJuly 22, 2025.
  70. ^Greig, Jonathan (June 27, 2024)."Suspected Chinese gov't hackers used ransomware as cover in attacks on Brazil presidency, Indian health org".therecord.media.Recorded Future. RetrievedJuly 22, 2025.
  71. ^"Foreign hackers attack Canadian government".CBC News. February 16, 2011.Archived from the original on February 18, 2011. RetrievedFebruary 17, 2011.
  72. ^"Chinese cyberattack hits Canada's National Research Council".CBC News. July 29, 2014.Archived from the original on July 29, 2014. RetrievedJuly 29, 2014.
  73. ^Boynton, Sean (May 24, 2023)."A Chinese cyber espionage operation is hitting U.S. infrastructure, West warns".Global News.Archived from the original on January 12, 2024. RetrievedJanuary 12, 2024.
  74. ^abLau, Stuart (March 29, 2024)."UK, Czech ministers among China's hacking targets".Politico Europe.Archived from the original on May 28, 2025. RetrievedApril 2, 2024.
  75. ^Janicek, Karel (May 28, 2025)."Czech Republic accuses China of 'malicious cyber campaign' against its foreign ministry".Associated Press. RetrievedMay 28, 2025.
  76. ^"Denmark Issues Warning on Severe Cyber Attacks Targeting Telecommunications".Cyber Security News. March 18, 2025.Archived from the original on April 23, 2025. RetrievedJuly 20, 2025.
  77. ^"Cybertruslen mod telesektoren"(PDF).Styrelsen for Samfundssikkerhed (in Danish).Archived(PDF) from the original on May 5, 2025. RetrievedJuly 20, 2025.
  78. ^Tanner, Jari (March 18, 2021)."Finland IDs hackers linked to parliament spying attack".Associated Press. RetrievedJuly 20, 2025.
  79. ^"Finland confirms APT31 hackers behind 2021 parliament breach".BleepingComputer. March 26, 2024.Archived from the original on March 27, 2024. RetrievedMarch 28, 2024.
  80. ^Maignan, Antoine (May 3, 2024)."French Lawmakers Sound Alarm Over Alleged Chinese Hacking".Barron's.Agence France-Presse.Archived from the original on May 6, 2024. RetrievedMay 6, 2024.
  81. ^"China mounts cyber attacks on Indian sites".The Times of India. India. May 5, 2008.Archived from the original on August 26, 2011. RetrievedOctober 25, 2010.
  82. ^"'നിശബ്ദ യുദ്ധ'ത്തിന് പിന്നിൽ ചൈന; ടാർഗറ്റ് ഇന്ത്യയും അമേരിക്കയും".ManoramaOnline.Archived from the original on June 6, 2018. RetrievedJune 6, 2018.
  83. ^Rising, David (April 7, 2022)."Chinese hackers reportedly target India's power grid".Associated Press.Archived from the original on April 10, 2022. RetrievedApril 10, 2022.
  84. ^Cimpanu, Catalin (September 9, 2021)."Indonesian intelligence agency compromised in suspected Chinese hack".therecord.media.Recorded Future.Archived from the original on June 21, 2025. RetrievedJuly 20, 2025.
  85. ^Rising, David; Karmini, Niniek (September 20, 2021)."Indonesia says no evidence of alleged Chinese intel hack".Associated Press.Archived from the original on December 16, 2022. RetrievedJuly 20, 2025.
  86. ^"Chinese hackers disguised themselves as Iran to target Israel".MIT Technology Review. August 10, 2021.Archived from the original on March 7, 2025. RetrievedJuly 20, 2025.
  87. ^Tress, Luke (August 10, 2021)."Chinese group carried out widespread cyber espionage campaign in Israel – report".The Times of Israel.Archived from the original on November 20, 2022. RetrievedJuly 20, 2025.
  88. ^"America is coming after Chinese it accuses of hacking".The Economist. July 10, 2025.ISSN 0013-0613.Archived from the original on July 10, 2025. RetrievedJuly 13, 2025.
  89. ^"Chinese military seen behind Japan cyberattacks".The Japan Times. April 20, 2021.Archived from the original on April 23, 2021. RetrievedApril 23, 2021.
  90. ^Chaudhury, Dipanjan Roy (March 10, 2024)."Chinese hackers target critical security infra of resource rich Kazakhstan".The Economic Times.ISSN 0013-0389.Archived from the original on February 4, 2025. RetrievedJuly 20, 2025.
  91. ^Stankevičius, Augustas (April 3, 2024)."Two Lithuanian MPs targeted by decade-long Chinese hacker campaign".Lithuanian National Radio and Television.Archived from the original on April 23, 2025. RetrievedJuly 20, 2025.
  92. ^"Chinese spies hacked Dutch defence network last year - intelligence agencies".Reuters. February 6, 2024. RetrievedFebruary 6, 2024.
  93. ^Ensor, Jamie (May 25, 2023)."New Zealand, Five Eyes issue alert warning of China state actor engaging in 'malicious cyber activity'".Newshub. Archived fromthe original on January 12, 2024. RetrievedJanuary 12, 2024.
  94. ^Pearse, Adam (March 26, 2024)."Parliament systems targeted by China-based hackers".The New Zealand Herald.Archived from the original on March 26, 2024. RetrievedMarch 28, 2024.
  95. ^O'Dwyer, Gerard (September 3, 2021)."China accused of cyber attacks on Norwegian IT systems".ComputerWeekly.Archived from the original on June 5, 2025. RetrievedJuly 20, 2025.
  96. ^Miller, Maggie (July 19, 2021)."Chinese hackers blamed for breach of Norwegian parliament email accounts".The Hill.Archived from the original on October 6, 2022. RetrievedJuly 20, 2025.
  97. ^"Detectan red de ciberespionaje basada en china que infiltró sistemas de Gobierno paraguayo".Listín Diario (in Spanish). November 26, 2024.Archived from the original on November 27, 2024. RetrievedJuly 20, 2025.
  98. ^"Ciberespionaje chino al sistema del Gobierno de Paraguay: ¿Qué datos se extrajeron?".Última Hora (in Spanish). November 27, 2024.Archived from the original on December 5, 2024. RetrievedJuly 20, 2025.
  99. ^Bordey, Hana (April 24, 2025)."NSC: There are 'indications' China interfering in Eleksyon 2025".GMA News.Archived from the original on April 24, 2025. RetrievedApril 24, 2025.
  100. ^Ager, Maila (April 24, 2025)."Tolentino bares evidence of China troll farm to discredit PH gov't".Philippine Daily Inquirer. RetrievedApril 24, 2025.
  101. ^Mangaluz, Jean (April 24, 2025)."Chinese Embassy tapped Makati PR firm to push pro-Beijing narratives in PH — Tolentino".The Philippine Star.Archived from the original on April 24, 2025. RetrievedApril 24, 2025.
  102. ^Judah, Jacob; Sonne, Paul; Troianovski, Anton (June 7, 2025)."Secret Russian Intelligence Document Shows Deep Suspicion of China".The New York Times.ISSN 0362-4331.Archived from the original on June 9, 2025. RetrievedJune 14, 2025.
  103. ^Rajagopalan, Megha (June 19, 2025)."China Is Hacking Russia to Steal War Secrets".The New York Times.ISSN 0362-4331.Archived from the original on July 7, 2025. RetrievedJune 20, 2025.
  104. ^"How China's growing cyber-hacking capabilities have raised alarm around the world".The Straits Times. July 19, 2025.ISSN 0585-3923. RetrievedJuly 19, 2025.
  105. ^"What is UNC3886, the group that attacked Singapore's critical information infrastructure?".The Straits Times. July 18, 2025.ISSN 0585-3923. RetrievedJuly 19, 2025.
  106. ^"The malware in the SKT hack has links to a Chinese group. This may just be the beginning".Korea JoongAng Daily. May 19, 2025. RetrievedJuly 20, 2025.
  107. ^"How China's state-backed hackers are disrupting S. Korea's national systems".The Chosun Daily. June 5, 2025.Archived from the original on July 15, 2025. RetrievedJuly 20, 2025.
  108. ^abClaburn, Thomas."China Cyber Espionage Threatens U.S., Report Says".InformationWeek. Archived fromthe original on February 27, 2010. RetrievedNovember 1, 2010.
  109. ^abNakashima, Ellen; Eunjung Cha, Ariana (January 14, 2010)."Google China cyberattack part of vast espionage campaign, experts say".The Washington Post.ISSN 0190-8286.Archived from the original on February 11, 2021. RetrievedJuly 14, 2024.
  110. ^McMillan, Robert (October 23, 2009)."Report Says China Ready for Cyber-war, Espionage".PC World.Archived from the original on April 2, 2010. RetrievedNovember 1, 2010.
  111. ^abGorman, Siobhan (April 9, 2009)."Electricity Grid in U.S. Penetrated By Spies".The Wall Street Journal.ISSN 0099-9660.Archived from the original on June 25, 2018. RetrievedApril 1, 2022.
  112. ^"The new front in China's cyber campaign against America".The Economist. June 13, 2024.ISSN 0013-0613.Archived from the original on June 13, 2024. RetrievedJune 15, 2024.
  113. ^abMenn, Joseph (July 16, 2025)."China's cyber sector amplifies Beijing's hacking of U.S. targets".The Washington Post.ISSN 0190-8286.Archived from the original on July 17, 2025. RetrievedJuly 21, 2025.
  114. ^"Google cyberattack hit password system: report".Reuters. April 20, 2010.Archived from the original on March 26, 2023. RetrievedMarch 17, 2025.
  115. ^Goodin, Dan (May 21, 2013)."Chinese hackers who breached Google reportedly targeted classified data".Ars Technica.Archived from the original on November 8, 2014. RetrievedNovember 8, 2014.
  116. ^Jacobs, Andrew; Helft, Miguel (January 12, 2010)."Google, Citing Attack, Threatens to Exit China".The New York Times.ISSN 0362-4331.Archived from the original on February 2, 2017. RetrievedJuly 14, 2024.
  117. ^Zetter, Kim (January 13, 2010)."Google Hackers Targeted Source Code of More Than 30 Companies".Wired. Archived fromthe original on September 18, 2010. RetrievedNovember 1, 2010.
  118. ^"US embassy cables: China uses access to Microsoft source code to help plot cyber warfare, US fears".The Guardian. December 4, 2010.ISSN 0261-3077.Archived from the original on September 24, 2024. RetrievedJuly 14, 2024.
  119. ^Riley, Michael, and Dune Lawrence, "Hackers Linked to China's Army Seen From EU to D.C.Archived January 11, 2015, at theWayback Machine",Bloomberg L.P., 27 July 2012
  120. ^"China's Response to BusinessWeek".BusinessWeek. April 10, 2008. Archived fromthe original on October 25, 2012. RetrievedFebruary 12, 2013.
  121. ^Zetter, Kim (January 25, 2010)."China Accuses US of Cyberwarfare".Wired.Archived from the original on December 28, 2010. RetrievedOctober 23, 2010.
  122. ^Nakashima, Ellen (May 20, 2023)."Report on 'Operation Shady RAT' identifies widespread cyber-spying".The Washington Post.ISSN 0190-8286.Archived from the original on April 24, 2020. RetrievedJuly 14, 2024.
  123. ^Anderlini, Jamil (January 15, 2010)."The Chinese dissident's 'unknown visitors'".Financial Times.Archived from the original on September 10, 2010. RetrievedAugust 3, 2011.
  124. ^Barnes, Julian E. (March 4, 2008)."China's computer hacking worries Pentagon".Los Angeles Times. Archived fromthe original on March 10, 2008. RetrievedMarch 4, 2008.
  125. ^Brookes, Peter (March 13, 2008)."Flashpoint: The Cyber Challenge: Cyber attacks are growing in number and sophistication".Family Security Matters. Archived fromthe original on March 29, 2008. RetrievedApril 7, 2008.
  126. ^Wolf, Jim (November 19, 2010)."Pentagon says "aware" of China Internet rerouting".Reuters.Archived from the original on November 23, 2010. RetrievedNovember 26, 2010.
  127. ^abErickson, Andrew; Collins, Gabe (August 25, 2011)."Did China Tip Cyber War Hand?".The Diplomat.Archived from the original on April 2, 2023. RetrievedJuly 14, 2024.
  128. ^"The U.S. Presses on Cyberthreats; In Beijing, Treasury Secretary Frames Issue as a Top Priority in Ties With China".Archived May 18, 2017, at theWayback Machine March 20, 2013The Wall Street Journal
  129. ^Finkle, J., Menn, J., Viswanatha, J."U.S. accuses China of cyber spying on American companies".Archived October 6, 2014, at theWayback Machine Reuters, May 19, 2014.
  130. ^Clayton, Mark (May 19, 2014)."US indicts five in China's secret 'Unit 61398' for cyber-spying on US firms".Christian Science Monitor.ISSN 0882-7729.Archived from the original on May 20, 2014. RetrievedJuly 14, 2024.
  131. ^Chinese hacked U.S. military contractors, Senate panel findsArchived March 22, 2018, at theWayback Machine September 18, 2014Reuters
  132. ^FBI warns U.S. businesses of cyber attacks, blames BeijingArchived March 22, 2018, at theWayback Machine October 16, 2014Reuters
  133. ^Peterson, Andrea (September 24, 2015)."OPM says 5.6 million fingerprints stolen in the biggest cyber attack in US history. America doesn't have anything together this is why this happened".Independent.Archived from the original on September 15, 2017. RetrievedAugust 26, 2017.
  134. ^Sanders, Sam (June 4, 2015)."Massive Data Breach Puts 4 Million Federal Employees' Records At Risk".NPR.Archived from the original on June 5, 2015. RetrievedApril 5, 2018.
  135. ^"Hacks of OPM databases compromised 22.1 million people, federal authorities sayArchived July 26, 2018, at theWayback Machine".The Washington Post. July 9, 2015.
  136. ^"China Used a Tiny Chip in a Hack That Infiltrated U.S. Companies".Bloomberg News. October 4, 2018.Archived from the original on October 4, 2018. RetrievedMarch 14, 2024.
  137. ^Gordon Lubold; Dustin Volz (March 12, 2019)."Navy, Industry Partners Are 'Under Cyber Siege' by Chinese Hackers, Review Asserts; Hacking threatens U.S.'s standing as world's leading military power, study says".WSJ.com.Archived from the original on March 13, 2019. RetrievedMarch 14, 2019.
  138. ^Mortensen, Antonia; Lyngaas, Sean (July 8, 2025)."US seeks extradition of Chinese man held in Italy accused of hacking to steal Covid-19 vaccine research | CNN Politics".CNN. RetrievedJuly 14, 2025.
  139. ^"US charges 4 members of Chinese military with Equifax hack".CNN. February 10, 2020.Archived from the original on February 11, 2020. RetrievedFebruary 10, 2020.
  140. ^Riotta, Chris (February 10, 2020)."US charges Chinese military hackers over cyber-attack of Equifax".The Independent.Archived from the original on October 7, 2024. RetrievedOctober 6, 2024.
  141. ^"China, Caught Meddling in Past Two US Elections, Claims 'Not Interested' in 2020 Vote".Voice of America. April 30, 2020.Archived from the original on May 18, 2020. RetrievedMay 17, 2020.
  142. ^Barnes, Julian E. (March 16, 2021)."Russian Interference in 2020 Included Influencing Trump Associates, Report Says".The New York Times.ISSN 0362-4331.Archived from the original on April 21, 2021. RetrievedApril 21, 2021.
  143. ^"Suspected Chinese hackers spied on U.S., European targets".PBS NewsHour. April 20, 2021.Archived from the original on April 21, 2021. RetrievedApril 21, 2021.
  144. ^"China-linked hackers used VPN flaw to target U.S. defense industry -researchers".in.finance.yahoo.com.Archived from the original on April 21, 2021. RetrievedApril 21, 2021.
  145. ^Miller, Maggie (April 20, 2021)."Multiple agencies breached by hackers using Pulse Secure vulnerabilities".The Hill.Archived from the original on April 21, 2021. RetrievedApril 21, 2021.
  146. ^"China-linked hackers used VPN flaw to target U.S. defense industry -researchers".Reuters. April 20, 2021.Archived from the original on April 21, 2021. RetrievedApril 21, 2021.
  147. ^Siddiqui, Zeba; Bing, Christopher; Bing, Christopher (May 25, 2023)."Chinese hackers spying on US critical infrastructure, Western intelligence says".Reuters.Archived from the original on May 25, 2023. RetrievedMay 25, 2023.
  148. ^Sanger, David E.; Barnes, Julian E. (July 29, 2023)."U.S. Hunts Chinese Malware That Could Disrupt American Military Operations".The New York Times.ISSN 0362-4331.Archived from the original on July 29, 2023. RetrievedJuly 29, 2023.
  149. ^Nakashima, Ellen; Menn, Joseph (December 12, 2023)."China's cyber army is invading critical U.S. services".The Washington Post.ISSN 0190-8286.Archived from the original on December 13, 2023. RetrievedDecember 16, 2023.
  150. ^Volz, Dustin (January 31, 2024)."U.S. Disables Chinese Hacking Operation That Targeted Critical Infrastructure".The Wall Street Journal.Archived from the original on February 6, 2024. RetrievedFebruary 6, 2024.
  151. ^Lyngaas, Sean (February 7, 2024)."Chinese hackers have lurked in some US infrastructure systems for 'at least five years'".CNN.Archived from the original on February 8, 2024. RetrievedFebruary 8, 2024.
  152. ^"Disrupting malicious uses of AI by state-affiliated threat actors". February 14, 2024.Archived from the original on February 16, 2024. RetrievedFebruary 16, 2024.
  153. ^"Staying ahead of threat actors in the age of AI".Microsoft. February 14, 2024.Archived from the original on February 16, 2024. RetrievedFebruary 16, 2024.
  154. ^McLaughlin, Jenna (February 22, 2024)."Leaked document trove shows a Chinese hacking scheme focused on harassing dissidents".NPR.Archived from the original on February 22, 2024. RetrievedFebruary 22, 2024.
  155. ^"Leaked files from Chinese firm show vast international hacking effort".The Washington Post. February 22, 2024. RetrievedFebruary 24, 2024.
  156. ^Mozur, Paul; Bradsher, Keith; Liu, John; Krolik, Aaron (February 22, 2024)."Leaked Files Show the Secret World of China's Hackers for Hire".The New York Times.ISSN 0362-4331.Archived from the original on February 23, 2024. RetrievedFebruary 23, 2024.
  157. ^Tucker, Eric (September 18, 2024)."FBI disrupts Chinese cyber operation targeting critical infrastructure in the US".Associated Press.Archived from the original on September 24, 2024. RetrievedSeptember 18, 2024.
  158. ^"Court-Authorized Operation Disrupts Worldwide Botnet Used by People's Republic of China State-Sponsored Hackers".United States Department of Justice. September 18, 2024.Archived from the original on October 12, 2024. RetrievedOctober 19, 2024.
  159. ^"The 30-year-old internet backdoor law that came back to bite". October 7, 2024.Archived from the original on January 17, 2025. RetrievedJanuary 17, 2025.
  160. ^Michael Kan (October 7, 2024)."Chinese Hackers Reportedly Breached ISPs Including AT&T, Verizon".PC Magazine. RetrievedOctober 8, 2024.privacy researchers to call out the US government for maintaining a confidential "backdoor" to enable internet-based wiretapping. "Case in point: there's no way to build a backdoor that only the 'good guys' can use," tweeted Meredith Whittaker, president of the encrypted chat app Signal
  161. ^Sarah Krouse; Dustin Volz; Aruna Viswanatha; Robert McMillan (October 5, 2024)."U.S. Wiretap Systems Targeted in China-Linked Hack".Wall Street Journal.Archived from the original on October 5, 2024. RetrievedOctober 8, 2024.For months or longer, the hackers might have held access to network infrastructure used to cooperate with lawful U.S. requests for communications data
  162. ^Dustin Volz (November 2, 2024)."Chinese Hackers Stole Phone Audio From Both Harris and Trump Campaigns".Wall Street Journal.Archived from the original on January 17, 2025. RetrievedNovember 3, 2024.targeted the phones of former President Donald Trump, his running mate, JD Vance, and people affiliated with Vice President Kamala Harris's presidential campaign
  163. ^Brooks Harper, Karen (November 20, 2024)."Gov. Greg Abbott issues this week's third executive order targeting China".The Dallas Morning News.Archived from the original on November 20, 2024. RetrievedNovember 21, 2024.
  164. ^Sanger, David E. (December 16, 2024)."Biden Administration Takes First Step to Retaliate Against China Over Hack".The New York Times.Archived from the original on December 17, 2024. RetrievedDecember 17, 2024.
  165. ^"Treasury says Chinese hackers remotely accessed workstations, documents in 'major' cyber incident".Associated Press. December 30, 2024.Archived from the original on December 30, 2024. RetrievedDecember 31, 2024.
  166. ^Smith, Colby (December 30, 2024)."US Treasury says Chinese state-backed actor hacked its computers".Financial Times.Archived from the original on December 30, 2024. RetrievedDecember 31, 2024.
  167. ^Hussein, Fatima (January 3, 2025)."US sanctions Beijing-based cyber group for its alleged role in hacking incidents".Associated Press.Archived from the original on January 4, 2025. RetrievedJanuary 4, 2025.
  168. ^"US sanctions China's Integrity Technology over alleged hacking sweep".Reuters. January 3, 2025. RetrievedJanuary 4, 2025.
  169. ^"Chinese hackers accessed Yellen's computer in US Treasury breach, Bloomberg News reports".Reuters. January 16, 2025. RetrievedApril 8, 2025.
  170. ^Satter, Raphael (March 5, 2025)."US indicts slew of alleged Chinese hackers, sanctions company over spy campaign".Reuters. RetrievedMarch 5, 2025.
  171. ^Titcomb, James (July 23, 2025)."Chinese hackers suspected of breaching US nuclear weapons agency".The Daily Telegraph.ISSN 0307-1235. RetrievedJuly 23, 2025.
  172. ^Greenberg, Andy (August 6, 2020)."Chinese Hackers Have Pillaged Taiwan's Semiconductor Industry".Wired.ISSN 1059-1028.Archived from the original on March 22, 2021. RetrievedJuly 14, 2024.
  173. ^"China-linked hackers target Taiwan's chip industry with increasing attacks, researchers say".Rappler.Reuters. July 17, 2025. RetrievedJuly 20, 2025.
  174. ^"Chinese spy network busted in Istanbul in major Turkish intel operation".Türkiye. May 20, 2025. RetrievedMay 24, 2025.
  175. ^Tucker, Maxim (April 1, 2022)."China accused of hacking Ukraine days before Russian invasion".The Times.ISSN 0140-0460.Archived from the original on July 10, 2024. RetrievedApril 1, 2022.
  176. ^"Mystery of alleged Chinese hack on eve of Ukraine invasion".BBC News. April 7, 2022. RetrievedApril 8, 2022.
  177. ^Milmo, Dan (May 25, 2023)."GCHQ warns of fresh threat from Chinese state-sponsored hackers".The Guardian.ISSN 0261-3077.Archived from the original on January 12, 2024. RetrievedJanuary 12, 2024.
  178. ^Psaledakis, Daphne; Pearson, James (March 25, 2024)."US, UK accuse China over spy campaign that may have hit millions".Reuters. RetrievedMarch 25, 2024.
  179. ^Hui, Sylvia (March 25, 2024)."US and UK announce sanctions over China-linked hacks on election watchdog and lawmakers".Associated Press.Archived from the original on March 25, 2024. RetrievedMarch 25, 2024.
  180. ^Sanger, David E.;Wong, Edward; Horowitz, Jason (July 28, 2020)."The Vatican Is Said to Be Hacked From China Before Talks With Beijing".The New York Times.ISSN 0362-4331.Archived from the original on August 6, 2020. RetrievedJuly 14, 2024.
  181. ^abTrinh, Viet Dung (March 20, 2024)."Vietnam's struggle with cyber security".East Asia Forum.Archived from the original on July 4, 2025. RetrievedJuly 20, 2025.
  182. ^abTrinh, Viet Dung (January 2, 2025). "Vietnam's Securitisation of Cybersecurity Under the Influence of a Rising China".Australian Journal of International Affairs.79 (1):169–188.doi:10.1080/10357718.2024.2431039.ISSN 1035-7718.
  183. ^Vavra, Shannon (April 30, 2020)."These tiny islands are at the heart of an uncovered Chinese phishing campaign".CyberScoop. RetrievedJuly 20, 2025.
Cyberwarfare by country
Core content
Mechanisms
Psychological
Computational
Economic
Media and Politics
Tactics
Related terms
Targets and campaigns
International Politics
Politics by country
Antisemitism
Environmental science
Medicine and Public health
Journalism and journalists
Countering disinformation
Fact-checking and research
Fact-checking
Research
WikiProjects
Retrieved from "https://en.wikipedia.org/w/index.php?title=Cyberwarfare_and_China&oldid=1315448339"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp