pwshub.com

China again claims Volt Typhoon was invented by the US

Chinese authorities have published another set of allegations that assert the Volt Typhoon threat actor is an invention of the US and its allies, and not a crew run by Beijing.

Published on Monday in five languages, a document titled "Lie to Me: Volt Typhoon III – Unravelling Cyberespionage and Disinformation Operations Conducted by US Government Agencies" largely revisits the content of a similar document published in July.

In its latest document, China's National Computer Virus Emergency Response Center (CVERC) and National Engineering Laboratory for Computer Virus Prevention Technology claim that Beijing's previous publications on the matter saw over 50 cyber security experts contact it to share their belief that US authorities and Microsoft lacked evidence to associate Volt Typhoon with China.

But the document doesn't disclose the identity of those experts, nor the basis for their analysis.

The document does go over a lot of old ground, detailing known US capabilities and efforts – such as Section 702 warrantless surveillance of foreigners. It also points out that the US ran the PRISM data collection program, and the National Security Agency's Office of Tailored Access Operation spyware operations – both exposed by Edward Snowden in 2013. The Marble framework used by the CIA to obfuscate its cyber-ops, revealed by Wikileaks in 2017, is also mentioned.

The abovementioned activities and tools, CVERC argues, are just the sort of thing of which Volt Typhoon has been accused. Volt Typhoon is therefore American and China's involvement is made up. QED.

  • US lawmakers seek answers on alleged Salt Typhoon breach of telecom giants
  • Beijing's attack gang Volt Typhoon was a false flag inside job conspiracy: China
  • Chinese cyberspies reportedly breached Verizon, AT&T, Lumen
  • Chinese spies spent months inside aerospace engineering firm's network via legacy IT

Another passage that caught The Register's eye suggests that analysis of online attacks follows a certain pattern:

The authors may have a point about Orientalism being a factor in infosec reporting.

But they're well off the mark criticizing koalas, as the marsupial's name is derived from the language of Australia's Dharug people and is not Anglo-Saxon at all. Further, koalas are almost entirely placid and spend most of their lives sleeping or chewing leaves. They're a terrible metaphor for anything other than languor - as are pandas.

The document ends with a call for international collaboration in infosec, and for vendors to "focus on counter-cyber threat technology research and better products and services for users."

That last point may be fair enough, given recent woes at Microsoft and CrowdStrike.

The Register eagerly awaits the next volume in this series, which will surely accuse the US of also running the Salt Typhoon group accused of infiltrating US ISPs at Beijing's behest. ®

Source: theregister.com

Related stories
1 day ago - Uncle Sam having a secret way into US tech? Say it ain't so A Chinese industry group has accused Intel of backdooring its CPUs, in addition to other questionable security practices while calling for an investigation into the chipmaker,...
8 hours ago - Globe Life claims blackmailers shared stolen into with short sellers US insurance provider Globe Life, already grappling with legal troubles, now faces a fresh headache: an extortion attempt involving stolen customer data.…
1 month ago - Organizations are acessing restricted tech, raising concerns about more potential loopholes More claims are emerging that developers in China are using US-based cloud services to bypass measures intended to block its access to advanced...
1 month ago - Chatterbox Labs CEO claims Chief Digital and Artificial Intelligence Office unfairly cancelled a contract then accused him of blackmail In-depth Chatterbox Lab CEO Danny Coleman alleges that after three and a half years of uncompensated...
1 month ago - Bagging two posh properties, three luxury cars on a govt salary a bit of a giveaway – allegedly The US Department of Justice has accused a now-former senior official of the New York State government of illegally advancing the interests of...
Other stories
17 minutes ago - Why You Can Trust CNET Our expert deal-hunting staff showcases the best price drops and discounts from reputable sellers daily. If you make a...
17 minutes ago - Looking for the top internet service provider while living in Rhode Island's largest city? Your options may be limited. However, this list will help you discover the top internet providers in Providence.
1 hour ago - Chipzilla uses WeChat post to defend record of following local laws Intel has roundly rebutted Chinese accusations that its chips include security backdoors at the direction of the US National Security Agency (NSA).…
2 hours ago - Here's today's NYT Mini Crossword answer. These answers will help you solve New York Times' popular crossword game, Mini Crossword, every day!
3 hours ago - 'My webcam isn't working today' is the new 'The dog ate my network' It's a pattern cropping up more and more frequently: a company fills an IT contractor post, not realizing it's mistakenly hired a North Korean operative. The phony worker...