Government officials revealed last week that they are searching for malicious computer code embedded inside networks that control power grids, communications systems, and water supplies across the United States.
The malware was first discovered in May when Microsoft detected unusual code hidden in systems on Guam, the Pacific island that houses strategic American Air Force and Marine bases. After the mysterious code was later discovered in other systems housed near U.S. military bases at home and abroad, cybersecurity experts speculated that the Chinese government had implanted the code and could try to use it to interrupt military operations.
However, any disruption to those operations could have far-reaching consequences, a congressional official told The New York Times. In most locations, civilian, business, and military infrastructure are connected to the same utility systems—so any disturbance to electricity, water, fuel, railway, or Internet connectivity could affect millions.
Joint efforts between the Pentagon, the National Security Council, the Homeland Security Department, the FBI, and the CIA to hunt down and remove the code have been ongoing for months. Although they claim no classified systems have been breached, officials admit that the full extent of the code’s presence in networks around the world is unknown. Similarly unknown is the malware’s true intent.
According to cybersecurity experts, this latest intrusion is different because disruption is the goal, not surveillance. Another theory is that the suspicious code may be intended to distract U.S. officials and citizens. If interruptions to critical infrastructure at home happened while China took disputed military action abroad, the American public could be so fixated on domestic problems that they would pay little attention to an overseas conflict.
For now, the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) issued an alert last week about the malware, saying it originated from Volt Typhoon, a state-sponsored Chinese hacking group, and was “living off the land.” That means the malicious code has avoided detection by blending in with day-to-day computer activity conducted by authorized users.
How Does the Malware Work?
Officials believe that the responsible hackers have used complex tactics to steal or mimic the authentication credentials of system administrators, who operate and monitor computer networks. Once those credentials are successfully used, hackers can essentially access any part of a network and surreptitiously implant their own code.
So far, no widespread public disruptions have been identified. But the malware attack only reinforces the belief that any individual, business, or organization can be infiltrated. That makes proactive protection critical for staying safe.
What Can Businesses and Individuals Do to Protect Themselves?
The usual technical advice is doled out in situations like these: monitor remote access protocols, analyze Internet traffic, and respond forcefully in the face of any suspicious activity. But for businesses, that behind-the-scenes work isn’t easy. That’s why it’s so important to partner with a trusted IT provider who specializes in such work and can enhance cybersecurity protection.
Here’s how CMIT Solutions responds to critical issues like this one:
Because the full extent of the recent malware isn’t known yet, it’s hard to predict the exact impacts it will have. But businesses across North America can use the news as an opportunity to shore up cybersecurity protections and enhance network defenses.
CMIT Solutions specializes in this kind of approach, preventing, detecting, and responding to online threats of all kinds. We’ve helped thousands of companies in the U.S. and Canada achieve operational resilience in the face of increasingly complex attacks.
We go the extra mile to protect the data, devices, and digital identities of our clients. While hackers devise new tricks to avoid standard network security defenses, our 900 plus staff members at offices across North America work day and night to develop new protections and enhance business success.
If you need a trusted partner to help you with cybersecurity, contact CMIT Solutions today.
KENOSHA – Blue House Books is thrilled to host NYT-bestselling author Jeneva Rose in Kenosha…
The holiday season offers a wonderful opportunity to support small businesses. From shopping locally to…
Seventeen Local Nonprofits Set to Receive Donations
Two Kenosha County sheriff's deputies were honored with a Carnegie Medal, one of the nation’s…
Kenosha, WI – November 20 – United Way of Kenosha County’s annual gala, The Live…
Uniquely Wisconsin has received an Emmy Award for a story featuring Kenosha County’s “Field of…
This website uses cookies.