FBI Director Christopher Wray warned Thursday that a hacking group linked to the Chinese government is waiting for the right moment to “deal a devastating blow” to U.S. critical infrastructure.
Wray delivered a keynote speech at the Vanderbilt Summit on Modern Conflict and Emerging Threats in Nashville, and told national security and intelligence experts that the risks posed by the government of China to U.S. national and economic security are “upon us now.”
The director said a recent bureau investigation found that the Chinese government had gained illicit access to networks within America’s “critical telecommunications, energy, water, and other infrastructure sectors.”
“The PRC [People’s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to induce panic and break America’s will to resist,” Wray said — the FBI explained “these vital sectors—everything from water treatment facilities and energy grids to transportation and information technology—form the backbone of our society.”
“The fact is, the PRC’s targeting of our critical infrastructure is both broad and unrelenting,” he added. “It’s using that mass, those numbers, to give itself the ability to physically wreak havoc on our critical infrastructure at a time of its choosing,”
Wray said CCP-sponsored cyber actors “prepositioned” themselves to potentially mount cyber offenses against American energy companies in 2011—targeting 23 different pipeline operators, with Wray saying this helps understand current motivations.
“When one victim company set up a honeypot—essentially, a trap designed to look like a legitimate part of a computer network with decoy documents—it took the hackers all of 15 minutes to steal data related to the control and monitoring systems, while ignoring financial and business-related information, which suggests their goals were even more sinister than stealing a leg up economically,” he said.
The CCP also targeted critical infrastructure organizations through more “scattershot, indiscriminate cyber campaigns” that also impact other victims—such as their Microsoft Exchange hack in 2021, which “targeted networks across a wide range of sectors,” Wray said.
The FBI is fighting back through bureau-led “joint, sequenced operations” alongside our partners.
“As part of those operations, we’re often sharing targeting and other information with partners like U.S. Cyber Command, foreign law enforcement agencies, the CIA, and others, and then acting as one,” Wray explained.
Given the level of trust many Americans currently have for the FBI, skepticism was rampant on social media… here’s a quick sampling of responses to the story, as seen on X:
Probably the beginning of November.
— Deborah Kammerer (@gub4112) April 18, 2024
Yeah we know. You have been too busy chasing conservatives for the past 5 years to notice
— J Hans (@blackhawkce457) April 18, 2024
Fortifying our grid and critical infrastructure should not be a political issue, it is a matter of national security…
Funny how they omit said fortifications from all these pork filled spending bills
— Joseph Le Sauvage (@JoesInvestments) April 18, 2024
Isn’t this the same thing they said about Russia? LMAO, I’m sure they are going to link Trump to this somehow.
— mista hella (@HellaMista) April 18, 2024
If only there was a way to pressure China into stopping this….
— Jill Todd (@Jill_Todd_USA) April 18, 2024
Ummmmmm ….. if you know about it then why can’t you just simply remediate it or put safeguards in place ahead of time? Or do you just prefer to sit back and observe the ensuing chaos?
— Bajan Bambino (@Bajan_Bambino) April 18, 2024
Click this link for the original source of this article.
Author: Tom Tillison
This content is courtesy of, and owned and copyrighted by, https://americanwirenews.com and its author. This content is made available by use of the public RSS feed offered by the host site and is used for educational purposes only. If you are the author or represent the host site and would like this content removed now and in the future, please contact USSANews.com using the email address in the Contact page found in the website menu.