Cyberwarfare And China
   HOME

TheInfoList



OR:

Cyberwarfare is the strategic use of computer technology to disrupt the functions of a state or organization, specifically through the deliberate targeting of information systems for military or tactical purposes. In the
People's Republic of China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
, it is related to the aggregate of
cyberattack A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
s attributed to state organs and various related
advanced persistent threat An advanced persistent threat (APT) is a stealthy threat actor, typically a State (polity), state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the ...
(APT) groups.


Background

Academic Fiona Cunningham writes that while it has targeted U.S. critical infrastructure with
Volt Typhoon Volt Typhoon (also known as VANGUARD PANDA, BRONZE SILHOUETTE, Redfly, Insidious Taurus, Dev-0391, Storm-0391, UNC3236, or VOLTZITE) is an advanced persistent threat engaged in cyberespionage reportedly on behalf of the People's Republic of China. ...
, as of mid-2024, there have been no public reports of a Chinese cyberattack with a scope similar to the United States-Israel
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
cyberattack on Iran, or the Russian cyberattacks on Ukraine's power grid).


Development history

In 1992, the
People's Liberation Army The People's Liberation Army (PLA) is the military of the Chinese Communist Party (CCP) and the People's Republic of China (PRC). It consists of four Military branch, services—People's Liberation Army Ground Force, Ground Force, People's ...
stated that the United States was developing computer virus weapons. According to the PLA journal ''Foreign Military Arts'', US computer virus weapons would have the potential to attack civilian targets and military targets. The PLA observed that cyberattacks could have strategic impacts. During the 1999
NATO bombing of Yugoslavia The North Atlantic Treaty Organization (NATO) carried out an aerial bombing campaign against the Serbia and Montenegro, Federal Republic of Yugoslavia during the Kosovo War. The air strikes lasted from 24 March 1999 to 10 June 1999. The bombing ...
, the United States bombed the Chinese embassy in Belgrade. The US stated that the bombing was accidental. Chinese leadership believed that the US had intentionally bombed the embassy and viewed China as significantly lacking in leverage against the United States. Among other efforts to reduce its gap in leverage, China sought to begin developing cyberwarfare capabilities. In 2000,
Jiang Zemin Jiang Zemin (17 August 1926 – 30 November 2022) was a Chinese politician who served as General Secretary of the Chinese Communist Party, general secretary of the Chinese Communist Party (CCP) from 1989 to 2002, as Chairman of the Central Mil ...
approved the development of cyber coercive capabilities. In a December 2000 speech to the
Central Military Commission Central Military Commission may refer to: *Central Military Commission (China), the highest national defense organization in the People's Republic of China. *Central Military Commission of the Communist Party of Vietnam, the highest body in Vietnam ...
(CMC), Jiang stated, " formation warfare is in the ascendant on the stage of warfare, with electronic network warfare and computer network warfare as the principle means." At the December 2002 CMC meeting, Jiang instructed the PLA to invest heavily in information warfare development and the PLA therefore established the All-Military Informatization Leading Small Group to coordinate this development. When he became Chairman of the CMC in 2004,
Hu Jintao Hu Jintao (born 21 December 1942) is a Chinese retired politician who served as the general secretary of the Chinese Communist Party (CCP) from 2002 to 2012, the president of China from 2003 to 2013, and chairman of the Central Military Comm ...
instructed the PLA to engage in a "new historic mission" to defend China's interests in the electromagnetic (and space) domains. Chinese leadership perceived that China was at an increasing risk of cyber threats from abroad. This perception was shaped from 2000 to 2010 by the early 2000s color revolutions, the Russian
cyberattacks A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
during the 2008 Russo-Georgian war, and the US-Israel Stuxnet cyberattack on Iran. The 2010s surveillance disclosures by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
about the extent of US global surveillance programs also highlighted to Chinese leadership the risks the country faced through its reliance on foreign hardware, software, and internet infrastructure. The PLA's first cyber blue team was established in
Guangzhou Military Region The Guangzhou Military Region was from 1955 to 2016 one of the People's Liberation Army PLA Military Regions, located in the south of the People's Republic of China. In May 1949, the Central China (Hua Zhong) Military Region (MR) was formed. In M ...
in May 2011 to test regular PLA unit's cyber defenses. At the
18th National Congress of the Chinese Communist Party The 18th National Congress of the Chinese Communist Party was held November 8–14, 2012 at the Great Hall of the People. Due to term limits and age restrictions, seven of the nine members of the powerful Politburo Standing Committee (PSC) retir ...
, Hu Jintao stated China should "implement the military strategy of active defense for the new period, and enhance military strategic guidance as the times so require. We should attach great importance to maritime, space, and cybersecurity." As part of its response to the United States intelligence activities in China demonstrated through the Snowden disclosures, the CCP in 2014 formed the Cybersecurity and Information Leading Group and the
National People's Congress The National People's Congress (NPC) is the highest organ of state power of the People's Republic of China (PRC). The NPC is the only branch of government in China, and per the principle of unified power, all state organs from the Sta ...
passed the 2017 Cyber Security Law. Under the
general secretaryship of Xi Jinping Xi Jinping succeeded Hu Jintao as General Secretary of the Chinese Communist Party (CCP) in 2012, and later in 2016 was proclaimed the CCP's 4th leadership core, following Mao Zedong, Deng Xiaoping, and Jiang Zemin. Xi Jinping secured an unpre ...
, the Chinese government has sponsored regular hacking competitions to identify top talent for state recruitment and, since 2018, has legally required all
vulnerabilities Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves ...
discovered to be reported solely to the
Ministry of Industry and Information Technology The Ministry of Industry and Information Technology (MIIT) is the sixth-ranked executive department of the State Council of the People's Republic of China. It is responsible for regulation and development of the postal service, Internet, wireles ...
. In 2018, Chinese nationals stopped participating in international hacking competitions. During the New Gutian Conference, Xi Jinping stated that cyber conflict was one of the main areas of military competition for the PLA and described the PLA as needing to overcome its "ostrich" attitude and rigid ways of thinking in this area. According to Xi's remarks, "Currently some work is not at all suitable for the requirements of the cyber era, and it is already increasingly clear that ideas and concepts and work methods are lacking in this age". In a 2016 cybersecurity speech, Xi stated that government, the PLA, and private enterprise should acquire cyber technology at the level of its rivals and that China needed to develop a "situational awareness posture at all times and in all locations". Xi stated that "if others use air strikes and we are still using swords and spears, that is unacceptable; offensive and defensive capabilities must be symmetrical." In 2019, he stated that China "continues to advance in the direction of balancing offensive and defensive cyber power" and that the country's "cyber-security deterrence capability to strike back continues to grow." In 2020, a Chinese cybersecurity firm,
Qihoo 360 Qihoo 360 (; approximate pronunciation CHEE-hoo), full name 360 Security Technology Inc., is a Chinese internet security company that has developed the antivirus software programs 360 Safeguard and 360 Mobile Safe, the Web browser 360 Secure Bro ...
, publicly claimed that a cyber espionage campaign was attributed to the
Central Intelligence Agency The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
. In a December 2024 meeting, a Chinese Ministry of Foreign Affairs official stated that Chinese cyberattacks against U.S. infrastructure are a response to American policies toward Taiwan.


Organization

While some details remain unconfirmed, it is understood that China organizes its resources as follows: * “Specialized military network warfare forces” () - Military units specialized in network attack and defense. * "
PLA Pla may refer to: People * Cecilio Plá (1860–1934), Spanish painter * Conrad Pla (born 1966), Canadian kickboxer and actor * Jim Pla (born 1992), French racing driver * Joan Baptista Pla (ca. 1720–1773), Spanish composer and oboist * Josefina ...
-authorized forces” () - network warfare specialists in the Ministry of State Security (MSS) and the Ministry of Public Security (MPS). * “Non-governmental forces” () - civilian and semi-civilian groups that spontaneously engage in network attack and defense. In response to claims that Chinese universities, businesses, and politicians have been subject to cyber espionage by the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
since 2009, the PLA announced a cyber security squad in May 2011 to defend their own networks. Since Xi became
General Secretary Secretary is a title often used in organizations to indicate a person having a certain amount of authority, Power (social and political), power, or importance in the organization. Secretaries announce important events and communicate to the org ...
of the
Chinese Communist Party The Communist Party of China (CPC), also translated into English as Chinese Communist Party (CCP), is the founding and One-party state, sole ruling party of the People's Republic of China (PRC). Founded in 1921, the CCP emerged victorious in the ...
in 2012, the Ministry of State Security (MSS) gained more responsibility over
cyberespionage Cyber espionage, cyber spying, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information using methods on the Internet, networks or individual computers th ...
compared with the PLA, and currently oversees various advanced persistent threats. According to security researcher Timo Steffens, advanced persistent threat (APT) groups in China leverage skills from private as well as public institutions and individuals, including smaller companies and hackers that take on government contracts. On 31 December 2015, the PLA established the Strategic Support Force (PLASSF). The PLASSF combined PLA cyber units from various PLA bodies into the Network Systems Department which included cyber intelligence, defense, and attack capabilities. In April 2024, the PLASSF was dissolved and its cyberwarfare capabilities and personnel were transferred to the newly created
People's Liberation Army Cyberspace Force The People's Liberation Army Cyberspace Force is an arm of the People's Liberation Army. It was established on 19 April 2024, followed by the dissolution of the People's Liberation Army Strategic Support Force (PLASSF). And the Cyberspace Force ...
. In 2017, ''
Foreign Policy Foreign policy, also known as external policy, is the set of strategies and actions a State (polity), state employs in its interactions with other states, unions, and international entities. It encompasses a wide range of objectives, includ ...
'' estimated China's "hacker army" personnel at between 50,000 and 100,000 individuals.


List of related APTs


Allegations of espionage and cyber-attacks


Australia

In May 2013,
ABC News ABC News most commonly refers to: * ABC News (Australia), a national news service of the Australian Broadcasting Corporation * ABC News (United States), a news-gathering and broadcasting division of the American Broadcasting Company ABC News may a ...
claimed that the Chinese government stole blueprints to the headquarters of the
Australian Security Intelligence Organisation The Australian Security Intelligence Organisation (ASIO ) is the Intelligence agency, domestic intelligence and national security agency of the Australian Government, responsible for protection from espionage, sabotage, acts of foreign inte ...
(ASIO). In May 2023, Australia, alongside other
Five Eyes The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are party to the multilateral UKUSA Agreement, a treaty for joint cooperat ...
member states, identified the Chinese government behind the "Volt Typhoon"
advanced persistent threat An advanced persistent threat (APT) is a stealthy threat actor, typically a State (polity), state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the ...
targeting critical infrastructure. In July 2024, government agencies from eight nations, including the
Australian Signals Directorate The Australian Signals Directorate (ASD), formerly the Defence Signals Directorate, is a statutory agency of the Government of Australia responsible for signals intelligence, providing intelligence support to Australian military operations, con ...
, released a joint advisory on APT40.


Canada

Officials in the
Canadian government The Government of Canada (), formally His Majesty's Government (), is the body responsible for the federal administration of Canada. The term ''Government of Canada'' refers specifically to the executive, which includes ministers of the Crown ( ...
claimed that Chinese hackers compromised several departments within the federal government in early 2011, though the Chinese government has denied involvement. In 2014, Canada's Chief Information Officer claimed that Chinese hackers compromised computer systems within the National Research Council. In May 2023, Canada's
Communications Security Establishment The Communications Security Establishment (CSE; , ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national cryptologic agency. It is responsible for foreign signal ...
identified the Chinese government as being behind the "Volt Typhoon" advanced persistent threat targeting critical infrastructure. In July 2024, government agencies from eight nations, including the Canadian Centre for Cyber Security, released a joint advisory on APT40.


Czech Republic

In 2021, Czech
Minister of Foreign Affairs In many countries, the ministry of foreign affairs (abbreviated as MFA or MOFA) is the highest government department exclusively or primarily responsible for the state's foreign policy and foreign relations, relations, diplomacy, bilateralism, ...
Jan Lipavský Jan Lipavský (born 2 July 1985) is a Czech politician and information technology manager who has been serving as Minister of Foreign Affairs (Czech Republic), Minister of Foreign Affairs of the Czech Republic since December 2021, in the Petr Fia ...
was targeted in a Chinese cyberespionage campaign by the Ministry of State Security's APT31 group. In response, Lipavský stated " is just proves the assessment in our Security Strategy, which states that the rising assertiveness of China is a systemic challenge that needs to be dealt with in coordination with our trans-Atlantic allies." In May 2025, the Czech
Ministry of Foreign Affairs In many countries, the ministry of foreign affairs (abbreviated as MFA or MOFA) is the highest government department exclusively or primarily responsible for the state's foreign policy and relations, diplomacy, bilateral, and multilateral r ...
stated that it was targeted by APT31, saying that " ch behavior undermines the credibility of the People’s Republic of China and contradicts its public declarations."


Germany

In July 2024, government agencies from eight nations, including Germany's
Federal Intelligence Service The Federal Intelligence Service (, ; BND) is the foreign intelligence agency of Germany, directly subordinate to the Chancellor's Office. The BND headquarters is located in central Berlin. The BND has 300 locations in Germany and foreign cou ...
and
Federal Office for the Protection of the Constitution The Federal Office for the Protection of the Constitution ( or BfV, often ''Bundesverfassungsschutz'') is Germany's federal domestic intelligence agency. Together with the Landesämter für Verfassungsschutz (LfV) at the state level, the fed ...
, released a joint advisory on APT40.


India

Officials in the
Indian government The Government of India (ISO: Bhārata Sarakāra, legally the Union Government or Union of India or the Central Government) is the national authority of the Republic of India, located in South Asia, consisting of 36 states and union territor ...
believe that attacks on Indian government networks, such as the attack on the Indian
National Security Council A national security council (NSC) is usually an executive branch governmental body responsible for coordinating policy on national security issues and advising chief executives on matters related to national security. An NSC is often headed by a n ...
, have originated from China. According to the Indian government, Chinese hackers are experts in operating
botnet A botnet is a group of Internet-connected devices, each of which runs one or more Internet bot, bots. Botnets can be used to perform distributed denial-of-service attack, distributed denial-of-service (DDoS) attacks, steal data, send Spamming, sp ...
s, which were used in these attacks. Additionally, other instances of Chinese
cyberattacks A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
against India's cyberspace have been reported in multitude.


Japan

In April 2021, Japan claimed that the Chinese military ordered cyberattacks on about 200 Japanese companies and research institutes, including
JAXA The is the Japanese national air and space agency. Through the merger of three previously independent organizations, JAXA was formed on 1 October 2003. JAXA is responsible for research, technology development and launch of satellites into o ...
. In July 2024, government agencies from eight nations, including Japan's
National Police Agency National Police may refer to the national police forces of several countries: *Afghanistan: Afghan National Police *Haiti: Haitian National Police *Canada: Royal Canadian Mounted Police *Colombia: National Police of Colombia *Cuba: National Revolut ...
, released a joint advisory on APT40.


The Netherlands

In 2024, the
Dutch Military Intelligence and Security Service The Military Intelligence and Security Service ( Dutch: ''Militaire Inlichtingen- en Veiligheidsdienst'') is the military intelligence service of the Netherlands, which operates under the Ministry of Defence. (online pdf here: https://www.docdro ...
and the
General Intelligence and Security Service The General Intelligence and Security Service ( ; AIVD) is the intelligence and security agency of the Netherlands, tasked with domestic, foreign and signals intelligence and protecting national security as well as assisting the Five Eyes in i ...
stated that Chinese state hackers penetrated a Dutch military network the prior year.


New Zealand

In May 2023, New Zealand, alongside other Five Eyes member states, named the Chinese government as being behind the "
Volt Typhoon Volt Typhoon (also known as VANGUARD PANDA, BRONZE SILHOUETTE, Redfly, Insidious Taurus, Dev-0391, Storm-0391, UNC3236, or VOLTZITE) is an advanced persistent threat engaged in cyberespionage reportedly on behalf of the People's Republic of China. ...
" advanced persistent threat targeting critical infrastructure. In March 2024, the
Government Communications Security Bureau The Government Communications Security Bureau (GCSB) () is the public service, public-service department of New Zealand charged with promoting New Zealand's national security by collecting and analysing information of an intelligence nature. Th ...
and New Zealand Government accused the Chinese government via APT40 of breaching its parliamentary network in 2021. In July 2024, government agencies from eight nations, including the New Zealand National Cyber Security Centre, released a joint advisory on APT40.


South Korea

In July 2024, government agencies from eight nations, including South Korea's National Intelligence Service, released a joint advisory on APT40.


United States

The United States has accused China of cyberwarfare attacks that targeted the networks of important American military, commercial, research, and industrial organizations. A Congressional advisory group has declared China "the single greatest risk to the security of American technologies" and "there has been a marked increase in cyber intrusions originating in China and targeting U.S. government and defense-related computer systems". China's cyberwarfare has expanded from cyber-espionage to "pre-positioning" activity for the sabotage and crippling of critical infrastructure. In January 2010,
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
reported targeted attacks on its corporate infrastructure originating from China "that resulted in the theft of intellectual property from Google."
Gmail Gmail is the email service provided by Google. it had 1.5 billion active user (computing), users worldwide, making it the largest email service in the world. It also provides a webmail interface, accessible through a web browser, and is also ...
accounts belonging to two
human rights activists A human rights defender or human rights activist is a person who, individually or with others, acts to promote or protect human rights. They can be journalists, environmentalists, whistleblowers, trade unionists, lawyers, teachers, housing campai ...
were compromised in an attack on Google's password system. Chinese hackers also gained access to a
database In computing, a database is an organized collection of data or a type of data store based on the use of a database management system (DBMS), the software that interacts with end users, applications, and the database itself to capture and a ...
containing
classified information Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or ...
about suspected spies, agents, and terrorists under surveillance by the US government. American security experts connected the Google attack to various other political and corporate espionage efforts originating from China, which included spying against military, commercial, research, and industrial corporations.
Obama administration Barack Obama's tenure as the 44th president of the United States began with his first inauguration on January 20, 2009, and ended on January 20, 2017. Obama, a Democrat from Illinois, took office following his victory over Republican nomine ...
officials called the cyberattacks "an increasingly serious cyber threat to US critical industries." In addition to Google, at least 34 other companies have been attacked. Reported cases include
Northrop Grumman Northrop Grumman Corporation is an American multinational Aerospace manufacturer, aerospace and Arms industry, defense company. With 97,000 employees and an annual revenue in excess of $40 billion, it is one of the world's largest Arms industry ...
,
Symantec Symantec may refer to: * Gen Digital, an American consumer software company formerly known as Symantec * Symantec Security, a brand of enterprise security software purchased by Broadcom Broadcom Inc. is an American multinational corporation, ...
,
Yahoo Yahoo (, styled yahoo''!'' in its logo) is an American web portal that provides the search engine Yahoo Search and related services including My Yahoo, Yahoo Mail, Yahoo News, Yahoo Finance, Yahoo Sports, y!entertainment, yahoo!life, an ...
,
Dow Chemical The Dow Chemical Company is an American multinational corporation headquartered in Midland, Michigan, United States. The company was among the three largest chemical producers in the world in 2021. It is the operating subsidiary of Dow Inc., ...
, and
Adobe Systems Adobe Inc. ( ), formerly Adobe Systems Incorporated, is an American software, computer software company based in San Jose, California. It offers a wide range of programs from web design tools, photo manipulation and vector creation, through to ...
. Cyber-espionage has been aimed at both commercial and military interests. Diplomatic cables highlight US concerns that China is exploiting its access to Microsoft source code to boost its offensive and defensive capabilities. A number of private computer security firms have stated that they have growing evidence of cyber-espionage efforts originating from China, including the " Comment Group". China has denied accusations of cyberwarfare, and has accused the United States of engaging in cyber-warfare against it, accusations which the United States denies. During 18 minutes on April 8, 2010, state-owned
China Telecom China Telecom Corporation Limited (CT) is a Chinese telecommunications company. It is one of the publicly traded red chip companies of the state-owned China Telecommunications Corporation. The company's H shares have been traded on the Sto ...
advertised erroneous network routes that instructed "massive volumes" of U.S. and other foreign Internet traffic to go through Chinese servers. A US Defense Department spokesman told reporters that he did not know if "we've determined whether that particular incident ... was done with some malicious intent or not" and China Telecom denied the charge that it "hijacked" U.S. Internet traffic. In 2011, a Chinese state TV program displayed outdated screenshots of a Chinese military institute performing cyber attacks on a US-based dissident entity. The direct visual evidence from an official Chinese source challenges China's claims that it never engages in overseas hacking for government purposes. During March 2013, high-level discussions continued. In May 2014, a federal
grand jury A grand jury is a jury empowered by law to conduct legal proceedings, investigate potential criminal conduct, and determine whether criminal charges should be brought. A grand jury may subpoena physical evidence or a person to testify. A grand ju ...
in the United States
indicted An indictment ( ) is a formal accusation that a person has committed a crime. In jurisdictions that use the concept of felonies, the most serious criminal offense is a felony; jurisdictions that do not use that concept often use that of an indi ...
five
PLA Unit 61398 PLA Unit 61398 (also known as APT1, Comment Crew, Comment Panda, GIF89a, or Byzantine Candor; , Pinyin: 61398 ''bùduì'') is the military unit cover designator (MUCD) of a People's Liberation Army advanced persistent threat unit that has been a ...
officers on charges of theft of confidential business information from U.S. commercial firms and planting
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
on their computers. To Chinese experts, the charges demonstrated the sophistication of the United States ability to attribute cyberattacks. In September 2014, a
Senate Armed Services Committee The Committee on Armed Services, sometimes abbreviated SASC for Senate Armed Services Committee, is a committee of the United States Senate empowered with legislative oversight of the nation's military, including the Department of Defen ...
probe revealed hackers associated with the Chinese government committing various intrusions of computer systems belonging to U.S. airlines, technology companies and other contractors involved with the movement of U.S. troops and military equipment, and in October 2014, The FBI added that hackers, who they believe to be backed by the Chinese government, have recently launched attacks on U.S. companies. In 2015, the
U.S. Office of Personnel Management The United States Office of Personnel Management (OPM) is an independent agency of the United States government that manages the United States federal civil service. The agency provides federal human resources policy, oversight, and support, and ...
(OPM) announced that it had been the target of a
data breach A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of personal information". Attackers have a variety of motives, from financial gain to political activism, political repression, and espionage. There ...
targeting the records of as many as 21.5 million people. ''The Washington Post'' reported that the attack came from China, citing unnamed government officials.
FBI director The director of the Federal Bureau of Investigation is the head of the Federal Bureau of Investigation (FBI), a United States federal law enforcement agency, and is responsible for its day-to-day operations. The FBI director is appointed for a ...
James Comey James Brien Comey Jr. (; born December 14, 1960) is an American lawyer who was the seventh director of the Federal Bureau of Investigation (FBI) from 2013 until Dismissal of James Comey, his termination in May 2017. Comey was a registered Repub ...
explained "it is a very big deal from a national security perspective and a counterintelligence perspective. It's a treasure trove of information about everybody who has worked for, tried to work for, or works for the United States government." In October 2018, ''
Bloomberg Businessweek ''Bloomberg Businessweek'', previously known as ''BusinessWeek'' (and before that ''Business Week'' and ''The Business Week''), is an American monthly business magazine published 12 times a year. The magazine debuted in New York City in Septembe ...
'' published a report, citing unnamed corporate and governmental sources, which claimed that the PLA had forced
Supermicro Super Micro Computer, Inc., doing business as Supermicro, is an American information technology company based in San Jose, California. The company is one of the largest producers of high-performance and high-efficiency servers, while also provi ...
's Chinese sub-contractors to add microchips with hardware backdoors to its servers. The report claimed that the compromised servers had been sold to U.S. government agencies (including the CIA and Department of Defense) and contractors and at least 30 commercial clients. In 2019, a study showed continued attacks on the US Navy and its industrial partners. In February 2020, a US federal grand jury charged four members of the PLA with the 2017 Equifax hack. The official account of FBI stated on Twitter that they played a role in "one of the largest thefts of personally identifiable information by state-sponsored hackers ever recorded". The ''
Voice of America Voice of America (VOA or VoA) is an international broadcasting network funded by the federal government of the United States that by law has editorial independence from the government. It is the largest and oldest of the American internation ...
'' reported in April 2020 that "U.S. intelligence agencies concluded the Chinese hackers meddled in both the 2016 and 2018 elections" and said "there have already been signs that China-allied hackers have engaged in so-called "spear-phishing" attacks on American political targets" ahead of the
2020 United States elections Elections in the United States, Elections were held in the United States on November 3, 2020. The Democratic Party (United States), Democratic Party's nominee, former Vice presidents of the United States, vice president Joe Biden, defeated incu ...
. In March 2021,
United States intelligence community The United States Intelligence Community (IC) is a group of separate US federal government, U.S. federal government intelligence agencies and subordinate organizations that work to conduct Intelligence assessment, intelligence activities which ...
released analysis in finding that China had considered interfering with the election but decided against it on concerns it would fail or backfire. In April 2021,
FireEye Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company that was founded in 2022. It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and ana ...
said that suspected Chinese hackers used a zero-day attack against Pulse Connect Secure devices, a VPN device, in order to spy on dozens of government, defense industry and financial targets in the U.S. and Europe. In May 2023,
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
and Western intelligence agencies reported that a Chinese state-sponsored hacking group affiliated with the PLA called "Volt Typhoon" had targeted critical infrastructure and military installations in
Guam Guam ( ; ) is an island that is an Territories of the United States, organized, unincorporated territory of the United States in the Micronesia subregion of the western Pacific Ocean. Guam's capital is Hagåtña, Guam, Hagåtña, and the most ...
, Hawaii, Texas and elsewhere. In January 2024, US authorities stated that they disrupted an operation by Volt Typhoon that had access to critical infrastructure in the US for at least five years. In February 2024,
OpenAI OpenAI, Inc. is an American artificial intelligence (AI) organization founded in December 2015 and headquartered in San Francisco, California. It aims to develop "safe and beneficial" artificial general intelligence (AGI), which it defines ...
announced that it had shut down accounts used by the Charcoal Typhoon and Salmon Typhoon hacking groups. The groups had been using their services to research companies, intelligence agencies, cybersecurity tools and evasion techniques, translate technical papers, write and refactor code, and create phishing campaign content. The same month, leaked documents from an MSS, PLA, and MPS contractor based in Shanghai called
I-Soon On 16 February 2024, a series of documents from Chinese information company i-Soon () were leaked on GitHub. The documents showed that the company emerged with several hacking and cyber espionage activities with the Chinese government. After the ...
, also known as Auxun, provided details into a campaign to harass
dissidents A dissident is a person who actively challenges an established political or religious system, doctrine, belief, policy, or institution. In a religious context, the word has been used since the 18th century, and in the political sense since the 2 ...
, activists, critical academics, and
Uyghurs The Uyghurs,. alternatively spelled Uighurs, Uygurs or Uigurs, are a Turkic peoples, Turkic ethnic group originating from and culturally affiliated with the general region of Central Asia and East Asia. The Uyghurs are recognized as the ti ...
overseas. In July 2024, government agencies from eight nations, including the United States National Security Agency and
Cybersecurity and Infrastructure Security Agency The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government, coordinating cyber ...
, released a joint advisory on APT40. In September 2024, FBI director
Christopher A. Wray Christopher Asher Wray (born December 17, 1966) is an American attorney who served as the eighth director of the Federal Bureau of Investigation (FBI) from 2017 to 2025. He was nominated by President Donald Trump to replace James Comey. He was ...
announced that Chinese state hacking campaign known as Flax Typhoon, which targeted critical infrastructure, had been disrupted. In October 2024, backdoors mandated by the 1994 Communications Assistance for Law Enforcement Act, which forces internet providers to provide backdoors for government authorities, were found to have been employed by China to tap communications in the U.S. using that infrastructure for months, or perhaps longer; China recorded presidential candidate campaign office phone calls —including employees of the then-vice president of the nation– and of the candidates themselves. In November 2024, Texas governor
Greg Abbott Gregory Wayne Abbott ( ; born November 13, 1957) is an American politician, attorney, and jurist who has served since 2015 as the 48th governor of Texas. A member of the Republican Party (United States), Republican Party, he served from 2002 to ...
ordered state agencies to harden critical infrastructure from cyberattacks from threats emanating from the PRC. In December 2024, the U.S. moved to crack down on China Telecom's cloud operations in the U.S. in response to the 2024 United States telecommunications hack. The same month, Chinese state-backed hackers were accused of obtaining a security key and accessing unclassified documents of the
United States Department of the Treasury The Department of the Treasury (USDT) is the Treasury, national treasury and finance department of the federal government of the United States. It is one of 15 current United States federal executive departments, U.S. government departments. ...
. In December 2024, the
Office of Foreign Assets Control The Office of Foreign Assets Control (OFAC) is a financial intelligence and enforcement agency of the United States Department of the Treasury, United States Treasury Department. It administers and enforces economic and trade economic sanctions, ...
(OFAC) sanctioned the Integrity Technology Group, an organization believed to be behind the Flax Typhoon APT. In January 2025, the computers of the
US Secretary of the Treasury The United States secretary of the treasury is the head of the United States Department of the Treasury, and is the chief financial officer of the federal government of the United States. The secretary of the treasury serves as the principal a ...
and several of her lieutenants were accessed by Chinese hackers. In March 2025, the
U.S. Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the U.S. government that oversees the domestic enforcement of federal laws and the administration of justice. It is equi ...
indicted 10 Chinese nationals who worked for MPS or its contractor I-Soon, also known as Auxun Information Technology.


Taiwan

Comparing the semiconductor industry in China mainland and Taiwan today, Taiwan is the leader in terms of overall competitiveness. On 6 August 2020, ''
Wired Wired may refer to: Arts, entertainment, and media Music * ''Wired'' (Jeff Beck album), 1976 * ''Wired'' (Hugh Cornwell album), 1993 * ''Wired'' (Mallory Knox album), 2017 * "Wired", a song by Prism from their album '' Beat Street'' * "Wired ...
'' published a report, stating that "Taiwan has faced existential conflict with China for its entire existence and has been targeted by China's state-sponsored hackers for years. But an investigation by one Taiwanese security firm has revealed just how deeply a single group of Chinese hackers was able to penetrate an industry at the core of the Taiwanese economy, pillaging practically its entire semiconductor industry."


Ukraine

In April 2022, ''
The Times ''The Times'' is a British Newspaper#Daily, daily Newspaper#National, national newspaper based in London. It began in 1785 under the title ''The Daily Universal Register'', adopting its modern name on 1 January 1788. ''The Times'' and its si ...
'' reported that days prior to the start of the
2022 Russian invasion of Ukraine On 24 February 2022, , starting the largest and deadliest war in Europe since World War II, in a major escalation of the Russo-Ukrainian War, conflict between the two countries which began in 2014. The fighting has caused hundreds of thou ...
, a cyberwarfare unit of the PLA launched cyberattacks against hundreds of Ukrainian government sites, according to officials of the
Security Service of Ukraine The Security Service of Ukraine ( ; abbreviated as SBU [] or SSU) is the main Internal security, internal security agency of the Government of Ukraine, Ukrainian government. Its main duties include counter-intelligence activity and combati ...
.


United Kingdom

In May 2023, the UK's National Cyber Security Centre, alongside other Five Eyes member states, identified the Chinese government behind the "Volt Typhoon" advanced persistent threat targeting critical infrastructure. In March 2024, the UK government and the United States Department of the Treasury's Office of Foreign Assets Control (OFAC) jointly sanctioned a Chinese MSS front company called Wuhan Xiaoruizhi Science and Technology and affiliated individuals for breaching the
Electoral Commission An election commission is a body charged with overseeing the implementation of electioneering process of any country. The formal names of election commissions vary from jurisdiction to jurisdiction, and may be styled an electoral commission, a c ...
and placing malware in critical infrastructure. In July 2024, government agencies from eight nations, including the UK's National Cyber Security Centre, released a joint advisory on APT40.


The Vatican

In July 2020, it was reported that Chinese state-sponsored hackers operating under the named RedDelta hacked the Vatican's computer network ahead of negotiations between China and the Vatican.


See also

*
Chinese intelligence activity abroad The government of the People's Republic of China is engaged in espionage overseas, directed through diverse methods via the Ministry of State Security (MSS), the Ministry of Public Security (MPS), the United Front Work Department (UFWD), People' ...
*
Chinese information operations and information warfare The People's Republic of China engages in information warfare through the People's Liberation Army (PLA) and other organizations affiliated or controlled by the Chinese Communist Party (CCP). Laid out in the Chinese Defence White Paper of 2008, i ...
*
Cyberwarfare by Russia Cyberwarfare by Russia includes denial of service attacks, hacker attacks, dissemination of disinformation and propaganda, participation of state-sponsored teams in political blogs, internet surveillance using SORM technology, persecution of ...
* Cyberwarfare and the United States * GhostNet *
Great Cannon The Great Cannon of China is an Internet attack tool that is used by the government of the People's Republic of China to launch distributed denial-of-service attacks on websites by performing a man-in-the-middle attack on large amounts of web t ...
* Honker Union * List of cyber warfare forces#China *
Operation Shady RAT Operation Shady RAT is an ongoing series of cyber attacks starting in mid-2006 reported by Dmitri Alperovitch, Vice President of Threat Research at Internet security company McAfee in August 2011, who also led and named the Night Dragon Operation ...
*
Red Apollo Red Apollo (also known as APT 10 by Mandiant, MenuPass by Fireeye, Stone Panda by Crowdstrike, and POTASSIUM by Microsoft) is a Chinese state-sponsored cyberespionage group which has operated since 2006. In a 2018 indictment, the United Stat ...
* 2021 Microsoft Exchange Cyberattack * 2024 United States Department of the Treasury hack


References

{{DEFAULTSORT:Cyberattacks by China Advanced persistent threat China–United States relations Cyberattacks Foreign relations of China Hacker groups Hacking (computer security) Espionage in China