home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,124 of 2,445   
   Mike Powell to All   
   Why no business is safe f   
   03 Apr 25 10:09:00   
   
   TZUTC: -0500   
   MSGID: 851.consprcy@1:2320/105 2c53e000   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Why no business is safe from state-sponsored cyber attacks   
      
   Date:   
   Thu, 03 Apr 2025 06:26:43 +0000   
      
   Description:   
   State-sponsored hackers Volt and Salt Typhoon target businesses worldwideno   
   one is safe from cyber warfare.   
      
   FULL STORY   
   ======================================================================   
      
   The threat landscape is evolving at an alarming rate, and business leaders    
   who may have previously believed that nation-state attacks are a problem for   
   governments alone are increasingly mistaken. The latest revelations   
   surrounding Chinas Volt Typhoon and Salt Typhoon campaigns should serve as a   
   wake-up call to executives worldwide. These are not theoretical threatsthey   
   are calculated, long-term infiltrations into critical infrastructure, and no   
   company or country is off-limits.    
      
   While the bulk of the activity surrounding these operations has focused on    
   the United States, the underlying objective is clear: establish persistent   
   access to key systems that, when needed, can be exploited for geopolitical   
   leverage. In other words, these attacks are not just about stealing   
   secretsthey are about preparing to disrupt entire industries and nations when   
   it is strategically advantageous to do so. And the UK, along with Europe and   
   other Five Eyes nations, is likely on that target list.    
      
   If your business operates in energy, telecommunications, transport, water, or   
   government-adjacent industries, youre already in the crosshairs. Volt    
   Typhoon, a Chinese-backed cyber operation, has been caught burrowing into   
   critical infrastructure with the goal of establishing long-term footholds    
   that can be used for future sabotage. Meanwhile, Salt Typhoon has been    
   focused on telecommunicationsan industry with a truly global footprint and an   
   essential enabler for economic and national security.   
      
   No organization is safe    
      
   The interconnected nature of global business means that no organization is   
   safe. The very corporations targeted in the USlarge multinational firms with   
   operations across the UK, Europe, and beyondare the same ones supporting   
   infrastructure elsewhere. China has every reason to expand these attacks to   
   Five Eyes allies like the UK, given its vested interest in disrupting   
   intelligence-sharing and counter-espionage efforts.    
      
   There is precedent for this expansion. Weve already seen similar tactics in   
   Flax Typhoon, which targeted Taiwan, and given Chinas long-term cyber   
   strategy, it is reasonable to assume that European and UK-based entities are   
   already on the list for similar intrusions. The question isnt if these    
   attacks will scale globallyits whether businesses will be prepared when they   
   do.    
      
   State-sponsored cyber actors typically dont launch ransomware attacks for   
   quick payouts. Their goals are much more insidious: access, persistence, and   
   control. Chinas cyber teams are laser-focused on industries where disruptions   
   would have the most significant impactenergy, water, communications,   
   transportation, and education.    
      
   These sectors are not just economic pillars; they are also key to national   
   security and societal stability. Imagine the chaos that could ensue if a   
   foreign adversary had the ability to disrupt power grids, water supplies, or   
   telecom networks at will, such as SektorCert in the EU.   
      
   Action required at board level   
      
   Yet many businesses in these sectors are still not treating cybersecurity as    
   a board-level issue. Too often, security is seen as an IT problem rather than   
   a core risk. If a company has any role in critical infrastructureeven as a   
   supplier to larger entitiesit should already be treating cyber resilience as    
   a priority, because ignoring it is an open invitation for adversarial    
   control.    
      
   There has been speculation about AI-powered cyber threats, but heres the   
   reality: Volt and Salt Typhoon are not using cutting-edge AI to develop novel   
   exploits. Instead, they are deploying well-worn tacticsleveraging known   
   vulnerabilities and methodically working through their targets with a level    
   of discipline that outpaces many corporate defenses.    
      
   However, China, like everyone else, is integrating AI into its cyber   
   operations. It may not be leading the charge in AI-powered hacking just yet,   
   but automation, summarization, and workflow efficiency tools are already    
   being employed to accelerate and scale cyber operations.    
      
   This means that while companies may not yet be facing AI-generated,   
   self-evolving malware , they are still dealing with adversaries who can   
   analyze, target, and exploit weaknesses faster than ever before. The key   
   takeaway is that businesses cannot afford to move at yesterdays speed when   
   their attackers are already operating at tomorrows pace.   
      
   Traditional security solutions arent enough   
      
   What makes the Volt and Salt Typhoon campaigns even more threatening is that   
   traditional security solutions firewalls , endpoint protection, intrusion   
   detectionsimply arent sufficient enough.    
      
   In fact, one of the biggest weaknesses that attackers like Volt and Salt   
   Typhoon exploit is a lack of network visibility. Businesses often invest in   
   endpoint protection and firewalls, yet many industrial control systems (ICS),   
   IoT devices, and network appliancesthe exact infrastructure being targeteddo   
   not support traditional security tools. This creates a massive blind spot,   
   allowing state-sponsored actors to infiltrate, persist, and move laterally   
   undetected.    
      
   Without deep, real-time network monitoring , organizations have no way of   
   detecting unusual patterns of behavior, unauthorized communications, or   
   stealthy command-and-control (C2) traffic that signal a compromise. Volt   
   Typhoon, for example, has been known to use living off the land techniques,   
   blending in with normal system activity to evade detection. The only way to   
   uncover these threats is through continuous monitoring, anomaly detection,    
   and threat intelligence integrationtraditional perimeter security simply isnt   
   enough.   
      
   Resilience is essential    
      
   Boardrooms globally must recognize that resilience against state-backed cyber   
   threats is as essential as financial stability. Businesses must adopt an   
   assumption-of-breach mindset, recognising that their systems may already be   
   compromised, and focus on threat hunting and proactive monitoring. Supply   
   chains have to be secured, as many breaches occur through third-party    
   vendors, making every link in the supply chain a potential vulnerability.    
      
   Companies that operate in or support critical industries must prioritize   
   robust cyber defenses now, rather than reacting once an attack occurs.   
   Aligning with national security efforts and intelligence-sharing initiatives   
   is critical, as collaboration with government cybersecurity bodies can    
   provide crucial insights and defenses. Training and testing must be   
   continuous, with regular cybersecurity education for employees and rigorous   
   red-teaming exercises to stay ahead of emerging threats.    
      
   We are just beginning to understand the full extent of the Salt Typhoon   
   campaign and the vulnerabilities it has exposed. This is just one front in an   
   ongoing cyber war where the stakes are national and economic security. The   
   sheer number of connected devices in the average organization today is   
   unmanageable without advanced monitoring, making network detection and    
   defense more critical than ever in identifying and stopping these persistent   
   threats before they escalate into full-scale cyber crises.    
      
    This article was produced as part of TechRadarPro's Expert Insights channel   
   where we feature the best and brightest minds in the technology industry   
   today. The views expressed here are those of the author and are not   
   necessarily those of TechRadarPro or Future plc. If you are interested in   
   contributing find out more here:   
   https://www.techradar.com/news/submit-your-story-to-techradar-pro   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/why-no-business-is-safe-from-state-sponsored-cyb   
   er-attacks   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca