China accuses US of covering up Volt Typhoon attribution

Published:

spot_img

China’s Accusations of U.S. Cyber Espionage Tactics and False Flag Operations

China Accuses U.S. of Cyber Espionage Cover-Up

In a bold move, China’s National Computer Virus Emergency Response Center (CVERC) released a 60-page report on Monday accusing the U.S. government of using a disinformation campaign to cover up its own cyber espionage activities. The report challenges Washington’s narrative of the China-linked Volt Typhoon group, claiming it is a smokescreen for U.S. intelligence hacking into Chinese infrastructure.

At the heart of the allegations is the ‘Marble’ toolkit, a U.S. intelligence tool that China says is used to mask the true source of cyberattacks by inserting foreign language strings into malware code. This tactic, known as a False Flag operation, aims to confuse attribution and mislead investigators, potentially leading to serious consequences in the geopolitical arena.

The report also delves into broader U.S. strategies of influence operations, accusing the country of using tactics like denial, disruption, and deception to maintain dominance in cyberspace. It criticizes the naming conventions used by U.S. companies like Microsoft and CrowdStrike, suggesting they are politically motivated and racially targeted.

Furthermore, the report sheds light on mass surveillance projects like ‘UpStream’ and ‘Prism,’ which allegedly allow the U.S. to monitor vast amounts of global internet traffic and access user data from major tech companies. It also accuses U.S. intelligence agencies of conducting supply chain attacks by inserting backdoors into hardware and software products sold to foreign targets.

The report’s revelations extend beyond foreign adversaries, claiming that U.S. allies like Germany, France, and Japan have also been targeted in intelligence-gathering efforts. It implicates companies like Microsoft in facilitating these activities, raising concerns about privacy and corporate cooperation in state-led surveillance.

As the cyber warfare tactics and espionage activities of the U.S. come under scrutiny, the report challenges the prevailing narrative and calls for a reevaluation of global cybersecurity practices.

spot_img

Related articles

Recent articles

CISOs Strengthen Resilience Amid Geopolitical Tensions by Focusing on Identity-Centric Security Fundamentals

CISOs Strengthen Resilience Amid Geopolitical Tensions by Focusing on Identity-Centric Security Fundamentals As geopolitical tensions and operational disruptions reshape the threat landscape in the Middle...

Microsoft Strengthens Security with Patches for SharePoint Zero-Day and 168 Additional Vulnerabilities

Microsoft Strengthens Security with Patches for SharePoint Zero-Day and 168 Additional Vulnerabilities On Tuesday, Microsoft announced a significant update aimed at addressing a record 169...

Ivanti Neurons ITSM Vulnerabilities Expose Session Persistence Risks

Ivanti Neurons ITSM Vulnerabilities Expose Session Persistence Risks A recently disclosed set of vulnerabilities in Ivanti Neurons for IT Service Management (ITSM) has raised significant...

Effective Data Protection: Vendor Support Strengthens Cybersecurity Implementation Success

Effective Data Protection: Vendor Support Strengthens cybersecurity Implementation Success In the rapidly evolving landscape of cybersecurity, organizations often find themselves grappling with the effective implementation...