According to The New York Times, Volt Typhoon malware still active, more dangerous than expected.

On July 29, 2023, The New York Times reviewed the Chinese State-sponsored group Volt Typhoon’s attacks on US critical infrastructure. The matter was first released in May 2023 but it is now believed the malware has been targeting US military bases since 2021, particularly on Guam.

Several military and intelligence sources told the Times the US has failed to identify and patch the malicious code, which is thought to have infected US military critical infrastructure networks. The malware’s potential for harm is thought to be greater than initially predicted. “It’s a ticking time bomb,” summarized a US Congress source.t

According to The New York Times, US authorities fear China may trigger the software in the event of an armed conflict, particularly in Taiwan. It could then disrupt the power grids, utilities and coms of US military bases, hindering troop movements.

Other sources believe China could carry out a coordinated attack against US infrastructure to sow panic within the country. The goal would then be to draw the public’s attention away from foreign conflicts. Beijing strongly denies any intrusion into US critical computer systems.

Stay tuned in real time
Subscribe to
the newsletter
By providing your email address you agree to receive the Incyber newsletter and you have read our privacy policy. You can unsubscribe at any time by clicking on the unsubscribe link in all our emails.
Stay tuned in real time
Subscribe to
the newsletter
By providing your email address you agree to receive the Incyber newsletter and you have read our privacy policy. You can unsubscribe at any time by clicking on the unsubscribe link in all our emails.