Was this helpful?
Thumbs UP Thumbs Down

China Quietly Admits Role in Cyber Attacks

Cyberattack concept with faceless hooded hacker.
Flag of China

China Quietly Admits to Hacking

Imagine someone breaks into your home, and instead of denying it, they shrug. That’s how China handled a recent closed-door meeting. Officials didn’t fully confess, but their vague words were clear enough.

For the first time, China stopped denying it had hacked U.S. systems. They hinted that attacks like the “Volt Typhoon” responded to U.S. actions on Taiwan. The U.S. took the message seriously. It wasn’t a direct threat, but it wasn’t friendly either.

Group of hooded hackers, hacking

What Exactly Is Volt Typhoon?

Volt Typhoon isn’t a storm; it’s a name given to a stealthy group of Chinese hackers. U.S. intelligence believes they’re tied directly to China’s military, not freelance hackers or rogue groups. That raises the stakes fast.

This group doesn’t slam doors open; they quietly pick the locks. Instead of crashing systems, they blend in, collecting data and mapping systems from the inside. Their goal isn’t quick chaos, it’s slow control.

Power grid

Attacks Hit Where It Hurts Most

Volt Typhoon didn’t aim for small targets. They targeted critical infrastructure sectors, including communications, energy, transportation, and water and wastewater. These aren’t just tech systems; they keep the country running.

Imagine the power goes out, phones stop working, or water stops flowing. These aren’t just annoyances, they’re serious threats. It’s not just about stealing secrets. It’s about having the power to cause massive disruptions if tensions rise.

Hour glass and calendar, time countdown concept

They Stayed Hidden for 300 Days

This wasn’t a quick break-in. In 2023, Volt Typhoon accessed parts of the U.S. power grid for nearly 300 days. That’s most of the year, without being detected.

This level of access gave them time to study the system and possibly even build backdoors for future use. Cybersecurity experts say this was a serious intelligence failure. If they stayed that long in one place, they were in other places too.

Taiwan flag with blue sky

Why Taiwan Is the Flashpoint

The reason for China’s cyber actions, according to U.S. officials, is linked to Taiwan. China sees Taiwan as part of its territory. The U.S. has been showing stronger support for the island lately.

That shift didn’t go unnoticed. China’s vague admission during the meeting seemed like a way to say, “We’re watching, and we’re ready to act.” Taiwan is a touchy subject. Any signal of stronger ties between the U.S. and Taiwan puts China on edge.

Flag of Switzerland

Geneva Meeting Was a Game-Changer

The meeting where China finally made its quiet admission occurred in Geneva, Switzerland, in December 2024. It wasn’t publicized. It was a behind-closed-doors meeting between U.S. and Chinese officials.

What made it stand out was the tone. China didn’t issue flat denials this time. They said things in a way that hinted they were behind the attacks but didn’t immediately say it. U.S. officials called the comments “indirect and ambiguous,” but it was clear enough.

Hacker tries to enter the system using codes and numbers

Advanced Hacking Tactics Used

Volt Typhoon doesn’t just use common tricks. They’re known to exploit zero-day vulnerabilities, bugs that developers don’t even know exist. That makes it nearly impossible for them to stop at first.

They also use “living off the land” techniques. This means using tools already built into the system they’re attacking. It helps them stay under the radar. By avoiding flashy attacks, they make detection harder for even the best defenders.

Anonymous hacker in hood and mask using laptop

A New Group Called Salt Typhoon

Volt Typhoon isn’t working alone. U.S. agencies have identified another Chinese-linked group, known as Salt Typhoon. This one focuses more on telecom systems and intelligence gathering.

Salt Typhoon isn’t as aggressive but still a serious threat. Salt Typhoon employs sophisticated techniques, such as exploiting vulnerabilities in Cisco routers, to maintain persistent access to telecommunications networks for prolonged espionage activities.

While Volt Typhoon prepares for potential attacks, Salt Typhoon builds a clearer picture of U.S. capabilities and weaknesses.

A hacker using his laptop

Spying or Planning a Strike?

There’s a big difference between stealing secrets and preparing for an attack. Salt Typhoon’s activity looks more like spying. Volt Typhoon’s efforts, though, feel more like preparing the battlefield.

Experts say Volt Typhoon’s long-term presence in critical systems isn’t about curiosity but control. They could flip a switch and cause real-world problems if conflict breaks out. That’s what makes this so different from usual cyber espionage.

View of USA flag

U.S. Plans a Cyber Response

This time, the U.S. may not stay quiet. There’s serious talk in Washington about launching counter-cyber operations. That includes possibly striking back against Chinese digital infrastructure.

These wouldn’t be random attacks. They’d be designed to send a message: Don’t mess with our systems. But launching a cyber response is risky. It could escalate tensions fast. That’s why officials are weighing their options carefully, trying to avoid worsening things.

Chinese military personnel in a high tech government hacking room

Backed by the Chinese Military

What makes Volt Typhoon more dangerous than other hacker groups? It’s believed to be backed directly by the Chinese military. That means it’s not some rogue group; it’s state-sponsored.

That kind of support brings serious resources, money, manpower, and protection. When governments run cyber groups, they don’t just aim to make money. They aim to win strategic advantages. The fact that Volt Typhoon works for the military changes everything.

Malware spreading in a laptop

A War Without Bombs or Guns

This isn’t your typical kind of battle. It’s a war fought through keyboards instead of tanks. Instead of bombs, they use malware. Instead of armies, they use hackers.

And the damage can be just as serious. People can get hurt if a hospital’s network goes down or a city loses power. Cyber warfare is getting more attention from the military and government. It’s quiet, sneaky, and could be devastating if things go too far.

Telecommunication tower

Telecom Attack Was a Wake-Up Call

One of the biggest shocks came from a breach in telecom networks. Some experts called it a “historic counterintelligence failure.” That means the attackers got in too deep, too easily.

This wasn’t a brief visit. They may still be there, hiding in the system. That worries officials most, not what already happened, but what could still happen. If a foreign group still has access to U.S. telecom systems, the risk isn’t just past tense.

Selective focus of USA flags

U.S. Cybersecurity Faces Setbacks

As threats rise, U.S. cybersecurity might be getting weaker. Recent mass federal layoffs under the Trump administration affected many cybersecurity roles.

Former officials warn this could have a major impact. With fewer experts watching critical systems, more threats might slip through. It’s not just about hiring new people, it’s about losing experienced ones who know where to look.

Engineer in rubber gloves holding computer microchip.

Taiwan’s Tech Role Matters Too

Taiwan isn’t just a political hotspot; it’s a tech giant. It’s home to companies that build semiconductors, the tiny chips that power almost everything today.

These chips are essential for phones, laptops, military satellites, and AI systems. That’s another reason the U.S. cares so much about Taiwan, and why China watches it so closely. Whoever controls chip production controls a big chunk of modern life.

Curious how chip makers like Nvidia are handling tech challenges? Check out how they tackled recent AI chip overheating issues.

Cyberattack concept with faceless hooded hacker.

Real-Life Risks for Americans

These cyberattacks might seem far away, but they affect everyday life. Things like power, internet, and clean water could be disrupted if China chooses to trigger its access.

It wouldn’t just be about government systems; it could hit neighborhoods, schools, or businesses. That’s why cybersecurity experts say these attacks are serious.

Want to see how China’s pushing ahead in tech? Take a look at their latest AR breakthrough that’s giving Apple some serious competition.

Do you think this kind of ‘half-admission’ is a smart move, or just a threat in disguise? Share your thoughts below.

Read More From This Brand:

Don’t forget to follow us for more exclusive content right here on MSN.

If you liked this story, you’ll LOVE our FREE emails. Join today and be the first to get stories like this one.

This content is exclusive for our subscribers.

Get instant FREE access to ALL of our articles.

Was this helpful?
Thumbs UP Thumbs Down
Prev Next
Share this post

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!

Send feedback to ComputerUser



    We appreciate you taking the time to share your feedback about this page with us.

    Whether it's praise for something good, or ideas to improve something that isn't quite right, we're excited to hear from you.