Cybersecurity2 hrs ago

UK Warns China-Linked Hackers Hijack 200k Devices for Cyber Espionage

The UK's NCSC and global partners warn that China-linked threat actors are exploiting 200,000 devices worldwide, using covert networks for cyber espionage. Learn mitigation steps.

Peter Olaleru/3 min/GB

Cybersecurity Editor

TweetLinkedIn
UK Warns China-Linked Hackers Hijack 200k Devices for Cyber Espionage
Source: The GuardianOriginal source

The UK's National Cyber Security Centre (NCSC) and allied agencies warn China-linked groups are hijacking 200,000 devices globally. These "covert networks" facilitate cyber espionage and sophisticated attacks, posing a significant threat to critical infrastructure.

Context Cybersecurity agencies from ten nations, led by the UK, have issued an urgent advisory regarding a significant shift in China-linked cyber tactics. Threat actors are increasingly leveraging compromised internet-connected devices, such as routers and webcams, to create "covert networks" or "botnets." These networks obscure the attackers' true origins during sophisticated espionage operations and data theft. This technique allows attackers to launch attacks from what appears to be legitimate residential or small business IP addresses, complicating attribution and defense.

Key Facts A single Chinese business infected 200,000 devices worldwide to construct one such extensive covert network. The NCSC reports that the majority of China-linked threat actors now utilize these sophisticated networks for their operations. Devices commonly targeted include small office/home office (SOHO) routers, printers, web cameras, and various Internet of Things (IoT) devices that often lack current security updates. This reliance on compromised consumer-grade hardware indicates a strategic effort to blend into normal internet traffic.

Richard Horne, NCSC's chief executive, emphasized the gravity of the situation, stating the UK faces "more than just a capable cyber-threat but a peer competitor in cyberspace." These covert networks provide an "eye-watering level of sophistication" for Chinese intelligence and military agencies. Groups like Volt Typhoon, previously identified by Western authorities, have reportedly used such networks to discreetly burrow into critical infrastructure in the US, including rail, aviation, and water systems. This illustrates the potential for significant disruption beyond mere data theft.

What Defenders Should Do (Mitigations) Organizations must immediately enhance their vigilance and defensive posture against these evolving threats. Implementing robust asset management to map all IT systems, including any connections to consumer broadband networks, is crucial for identifying potential entry points. Enforcing strong authentication measures, particularly multi-factor authentication (MFA) for all remote access and privileged accounts, significantly reduces unauthorized entry risk.

Limiting network connections to external devices and segments, where feasible, can contain potential breaches. Crucially, all network equipment, especially SOHO routers and IoT devices, must receive timely software updates and security patches. Proactive patching against known vulnerabilities, often detailed in advisories, is the primary defense against devices becoming unwitting participants in these global espionage networks. Continued monitoring for joint advisories from global cybersecurity agencies will provide crucial updates on evolving TTPs and mitigation strategies.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...