Wellness

National security leaders: Combating cyber threats from China takes collaboration

They may not look forward to getting rid of the patient’s data for ransom and disruption. Instead, the electronic crime groups punishable by the People’s Republic of China – including Hurricane Silk, which are believed to target health care organizations – may search for hospital planning and operational plans that can be used in physical attacks.

“Beijing is providing its electronic capabilities on the advanced operations aimed at stealing the information of the United States government and sensitive private sector, and additional, unnecessary attack options that may be published in a conflict,” said the director of National Intelligence, Tolsi Gabbard, in a written. certificate Tuesday.

She indicated that Solt is a hurricane attack on American telecommunications companies in 2024, which was known to target senior government officials and other prominent political figures.

“The People’s Republic of China remains the most active and continuous of the cyber on the US government, the private sector and critical infrastructure networks,” according to the federal government in assessing the annual threat of 2025 for the American intelligence community a report Intelligence leaders submitted to the legislators on Tuesday and Wednesday.

“PRC campaign to reach a critical infrastructure for attacks during the crisis or conflict, followed publicly like Hurricane VoltAnd clarifying its recent settlement of the US Telecom Infrastructure, which is also referred to as a hurricane of salt, the expansion and depth of the PRC capacity to settle the American infrastructure.

Silk threat is a hurricane of health care

Silk Typhoon is a state sponsored by a Chinese penetration organization, according to the American Hospital Association. Tar targeting various sectors, including health care and hospitals, it takes advantage of remote management tools and cloud applications for unauthorized access.

“Their actions caused disturbances in supply chains and pose major threats to critical infrastructure, including healthcare facilities,” Aha said in A. statement On its website earlier this month.

Silk Typhoon violates the keys to stolen application programming interface and accreditation data associated with distinctive access management systems, cloud applicants and cloud data management companies, Forbes Note Tuesday in a story About making a “plane on the plane” status for institutions applications.

“The group is famous for exploiting the weaknesses of EDGE devices in Edge devices, which target a wide range of sectors worldwide, such as IT, health, education and government.” Silk threat bulletin Hurricane Earlier this month.

Investigation of cyber terrorism from China

In January, the Biden Administration issued The executive thing about strengthening and promoting innovation in cybersecurity of the nation. Trump administration Absolute The cybersecurity review council established by the matter, including those Investigation of salt is a hurricane.

A group of PRC e -piracy sponsored PRC, which has organized attacks on eight communications companies, including AT & T in 2024. The first health care company is likely to be, but the company did not respond to previous requests for suspension.

In December, AT & T and Verizon said The discovery of the representative of the threat is no longer And that their networks were safe.

Meanwhile, former head of the Federal Communications Committee, Jessica Rosenorssal, proposed a media decision to show that Article 105 of the Law on Communications for Law of Law enforcement obliges companies to protect their networks from unauthorized access and adoption, in accordance with the December Law. a report in South Maryland Cronic.

Some members of Congress recently Request documents The Cyber ​​Security Agency and the American infrastructure of the campaigns expected by many cyberspacers from China that use the Typhoon, including Volt Typhoon, a violation organization in the Gulf state.

The actors of the threat were aimed at getting rid of the specific data related to operating procedures and spatial planning data related to the energy network operations and facility planning of the Litleton Electricity Station, Massachusetts, according to the Cyber ​​Security Company Dragos. This information can be used in a physical attack in the event of a conflict, according to a report in Record.

Last week, AHA and Health-VISAC Hospital A warned A possible terrorist threat against American hospitals In the coming weeks, he described it as active planning of the terrorist attack by multiple coordinators on American health sector organizations.

They said in a joint bulletin: “It is recommended that the organizations review and evaluate the coordination and capabilities of physical security, cybersecurity and emergency management plans.”

Last year, with contributions from Cisco Talos, NTT, Sophos, Cisa and FBI Issuing critical infrastructure warning directions To take the threat of attacks by the actors sponsored by the Chinese state “seriously”, focusing on Four specific procedures To take.

It should be noted that the Ministry of Governmental efficiency dismantled additional CISA employees I finish 300 contracts on February 14. Maryland State Court Judge I command The Trump administration to return more than 130 CISA employees under the separated monitoring, and the government places those who recovery with the agency on paid administrative leave.

Senator Angus King, I am Maine, the Management Committee, which rejects CISA staff last month, including individuals assigned specifically to investigate the increasing electronic terrorist threats sponsored by the state in assessing the annual threat 2025.

“So why does the administration dismantle Cisa?” He asked the king.

“President Trump focuses on antiquities,” said Gabbard Kabr in response to his questions about Cisa’s ability. “More people do not always mean better effects.”

The key to cooperation for cyber defense

Most of the Energy of the Senate Intelligence Committee on Tuesday hearing As for the scheduled annual global threat report, which includes the best national intelligence leadership, he went to the chat disaster that might constitute or not constitute a violation of classified information.

On Monday, and Atlantic Ocean Publish a story About many US leaders and the Ministry of Defense, including a journalist, in a chat on commercial application about an imminent American attack on Yemen in Yemen.

While the majority of the session appeared for two hours Flash legislators Ask questions that have not been answered largely, Senator Ted Bodh, R-North Carolina, asked about cybersecurity coming from China, specifically about Volt and other electronic organizations of electronic organizations that were exposed to the danger of energy companies in his term and others.

“What we have learned, and what can I tell them?” The Central Security Service Director of the National Security Agency asked Timothy Hawg.

Hogw said 99 % of the critical infrastructure is controlled by private companies, as partnership with the commercial industry is pushing the pursuit of these threats.

“Hurricane Volt started when [power sector] The industry came to the intelligence community and said: “We see an abnormal activity. Can you help us acquire the context? We were able to bring the context of that so that we can understand what the threat is and that we will eventually be able to determine who was behind this threat.”

Since that time, the National Security Agency has worked closely with the industry to prevent electronic interventions.

“It is a cooperation between the government and the industry to be able to eliminate these threats, and we have continued to follow them together since identifying our identity and notifying us for the first time regarding this self -threat.”

The US defense agencies are taking a “aggressive” approach to deterring electronic terrorism threats from China, and promised to go to more details in the closed session that followed the Senate intelligence session on Tuesday.

Andrea Fox is a great health care editor.
Email: Afox@himss.org

Healthcare is Hosz News.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button