Chinese hackers have vastly increased their efforts in recent years, burrowing into systems at ports, pipelines, water facilities and elsewhere. WSJ reporter Dustin Volz joins host James Rundle to talk about what this means for national security, and how companies such as major telecom providers were hacked in the first place.
Sign up for the WSJ's free Technology newsletter.
Learn more about your ad choices. Visit megaphone.fm/adchoices
[00:00:00] Bei Action gibt es immer extrem niedrige Preise. Venice Fleckenentferner für nur 3,98. Das ist wirklich günstig. Und Cape Town Handtuch aus nachhaltiger Baumwolle für nur 1,59. Alles bei Action? Klar, besuch eine unserer Filialen oder schau in unsere App für noch mehr tolle Angebote. Action, kleine Preise, große Freude.
[00:00:19] Welcome to Tech News Briefing. It's Wednesday, January the 8th. I'm James Rundle for The Wall Street Journal.
[00:00:30] Chinese hackers have been a menace in cyberspace for years, targeting the US government and the private sector, as well as presidential campaigns.
[00:00:37] But revelations about how deeply its hackers have penetrated US critical infrastructure have worried senior intelligence officials.
[00:00:44] We'll hear from our reporter Dustin Volz about how Chinese digital spies have infiltrated some of the most vital organizations in the US,
[00:00:51] positioning themselves to cause havoc if the conflict breaks out.
[00:00:58] Two massive hacking operations, named Salt Typhoon and Vault Typhoon by researchers, have spooked intelligence officials.
[00:01:05] Chinese hackers have broken into systems across ports, pipelines, water treatment systems and airports across the US in recent years, and done nothing.
[00:01:14] That's according to senior US officials, who say China is preparing to unleash chaos if America were to intervene in a future conflict, likely over Taiwan.
[00:01:24] Separately, Chinese spies also infiltrate the networks of major telecoms providers, enabling them to spy on text messages and phone calls from government officials, political figures and others.
[00:01:34] The WSJ interviewed dozens of national security, law enforcement and private sector officials about these attacks.
[00:01:40] Our reporter Dustin Volz joins us to discuss how serious China's intrusions are and what Washington is doing about it.
[00:01:46] Dustin, China has been in the headlines a lot in the past year for cyber activity.
[00:01:51] Can you put this in perspective?
[00:01:52] How sophisticated and aggressive have its actions been with its recent campaigns compared with its past activity?
[00:01:58] China has always been pretty aggressive in cyberspace and for really 15, 20 years now has been targeting US systems, private sector companies, government agencies.
[00:02:11] In 2008, for example, they hacked both the Obama and McCain presidential campaigns.
[00:02:16] So cyber aggression from China is nothing new.
[00:02:19] What's new here and what they're doing now is just different and alarming to senior US intelligence officials because instead of stealing private intellectual property from businesses or just mass quantities of personal data,
[00:02:34] they're breaking into scores of critical infrastructure systems, think pipelines, water sanitation systems, regional airports for the purpose of preparing for a future conflict likely over Taiwan and trying to basically deter or intimidate the US from engaging in a hot conflict.
[00:02:55] And that combined with these separate intrusions into US telecom networks that have been going on for well over a year in some cases and have allowed the Chinese hackers to surveil high profile targets by listening to their phone conversations and in some cases reading their text messages.
[00:03:16] These two attacks have combined to really put US officials on a new level of concern about what Beijing's been doing and just how not only sophisticated, but how vast their cyber hacking resources really are.
[00:03:30] So what has China actually been doing once it's compromised these systems?
[00:03:34] In the critical infrastructure attacks, which researchers call Volt Typhoon, they aren't actually disrupting a system.
[00:03:41] They're not taking down airports or slowing systems to a halt or anything like that.
[00:03:45] But what they are doing is lying in wait, essentially.
[00:03:49] They're getting in and waiting for future tasking orders to potentially do something that is more disruptive.
[00:03:55] And the reason US officials are so convinced that this is what they're doing is they're breaking into systems with no clear intelligence value, nothing really worth stealing.
[00:04:04] So they might break into a municipal emergency response system in Los Angeles, for example, and then lying in wait for months on end or in some cases years
[00:04:14] And periodically checking back to make sure that they have maintained that access into the systems.
[00:04:19] That's it.
[00:04:20] The inaction there is what's being seen as so alarming by US and Western security officials, because if they're just lying there in wait, what are their future plans?
[00:04:28] And the assessment is that their future plans are to wait until there is a conflict directly with the US, and then they can start doing things to disrupt these systems.
[00:04:38] Sure.
[00:04:38] And when we start talking about power grids, about water treatment facilities, about ports, pipelines, it has a very chilling effect.
[00:04:45] What has Washington done about this?
[00:04:47] A year ago, last January, senior US officials actually came forward and disclosed a lot of the critical infrastructure hacking activity.
[00:04:55] There was an effort to dismantle a botnet, which is sort of hijacked computer systems that were being used to help the Chinese enter these systems.
[00:05:04] So the authorities came out and dismantled that botnet.
[00:05:07] They made it very clear publicly that they didn't tolerate this activity and that they were looking for other victims and they were sharing threat intelligence with these different sectors in hopes that they would find other places that the hackers have been burrowing and hiding.
[00:05:21] And that's what they've been doing for now a couple of years is detecting dozens of critical infrastructure systems across the country where they are sort of lying in wait and have maintained persistent access.
[00:05:33] So the campaign to educate these often under-resourced critical infrastructure systems, these providers, to help them protect their systems, the campaign to educate them continues.
[00:05:44] They're finding the hackers in more places.
[00:05:46] But what's alarming is that at the same time that the White House and others have been pushing to try to deal with this issue of the infrastructure hacking,
[00:05:53] a separate group of Chinese hackers linked to their top intelligence agency had been very sneakily embedding itself into U.S. telecommunications infrastructure and doing so in a way where they were able to, in some cases,
[00:06:09] surveil directly the conversations of senior U.S. officials and political figures and also access U.S. law enforcement systems they use to wiretap criminal suspects, including potentially Chinese spies in the U.S.
[00:06:23] It's sort of just, you know, you try to address one problem and then you wake up and there's a whole nother crisis.
[00:06:28] Chinese hackers are everywhere all at once and they're preparing for war.
[00:06:31] And that's really sort of what's so frightening right now for a lot of U.S. officials.
[00:06:35] What has the Chinese government said about this?
[00:06:37] The Chinese government has denied this repeatedly.
[00:06:39] In fact, U.S. officials, including Secretary Blinken, have attempted to directly confront senior Chinese Communist Party officials.
[00:06:46] Last April, while visiting China, Secretary Blinken actually presented essentially evidence saying,
[00:06:53] we know that you're in all these systems, that your hackers are doing these things and we really need you to cut it out.
[00:06:58] And China basically said, we have no idea what you're talking about.
[00:07:00] This looks like it might be a criminal ransomware group, if anything.
[00:07:03] We have nothing to do with it.
[00:07:04] Please stop with these fabricated assertions.
[00:07:07] And then publicly, Chinese officials will say that they are not doing anything that the U.S. isn't also doing.
[00:07:13] These are smears, these are lies.
[00:07:15] The true criminal out there when it comes to cybersecurity is the U.S. government.
[00:07:19] So that is how China has been responding.
[00:07:21] Coming up, we hear about how hackers managed to breach systems at telecom giants
[00:07:25] and the challenge this presents for President-elect Donald Trump's administration.
[00:07:29] That's after the break.
[00:07:41] You mentioned earlier that a lot of critical infrastructure companies tend to be poorly resourced when it comes to cybersecurity.
[00:07:47] Major telecoms companies, we don't generally associate with the lack of resources.
[00:07:51] Do we know how China has achieved such unprecedented compromise into all these companies?
[00:07:56] We know some details about it.
[00:07:58] It's still sort of an evolving process and investigators continue to learn more.
[00:08:01] But we know that in the telecom hacks, it appears as though in all or nearly all cases,
[00:08:08] the intrusions relied on unpatched vulnerabilities that were known to the public
[00:08:12] and known to security analysts and experts.
[00:08:14] In other words, there was aging old telecom infrastructure that was leveraged and accessed by the hackers
[00:08:21] because they just didn't have the defenses that they needed and they hadn't been patched and they weren't up to date.
[00:08:27] And there will be a lot of finger pointing to come in the months ahead as investigators continue to sort through this.
[00:08:32] But that's really stunning because, as you said, these are well-resourced telecommunications companies.
[00:08:37] The victims include Verizon and AT&T, the two biggest in the U.S.,
[00:08:40] as well as a lot of other ones that are smaller.
[00:08:42] But in each case, and each case was different in some respects,
[00:08:45] the hackers were able to hijack large network routers essentially
[00:08:50] and use those to conceal their activity, to cover their tracks, to do a lot of espionage.
[00:08:56] And U.S. officials in the Biden administration have really pushed over the last four years
[00:09:01] to install minimum cybersecurity mandates for different industries.
[00:09:05] For example, after the Colonial Pipeline hack of 2021 that briefly led to the shutdown of the largest conduit of fuel on the East Coast,
[00:09:14] the Biden administration pushed forward mandates for pipelines,
[00:09:18] cybersecurity mandates that basically made it so that they had to comply with baseline requirements for cybersecurity.
[00:09:24] The administration has done this in a couple of other industries as well, including aviation,
[00:09:29] but they haven't done it in telecoms.
[00:09:32] And the officials I spoke to about this, asking them why, it's for a number of reasons.
[00:09:37] Government can be slow, but also a lot of folks thought that telecoms were actually already well-resourced,
[00:09:42] that they had a pretty good sense of their cybersecurity and were able to invest in it heavily already,
[00:09:47] and that they didn't need these kinds of executive action regulatory mandates,
[00:09:52] the same way that some of the other industries seemingly were more urgent and needing of attention.
[00:09:57] And so now you're seeing that the Federal Communications Commission and others are taking a look at what they can do
[00:10:01] to potentially increase the cybersecurity standards for telecommunications networks.
[00:10:06] And the companies are saying they recognize that the cybersecurity is existential for them
[00:10:11] and that they need to do more to make sure that these types of attacks are dealt with and hopefully don't happen again.
[00:10:16] So the big question is, now that we know the hackers have been in the networks, are they still there?
[00:10:20] So the companies say that they believe they have basically addressed this issue in the telecom hacks
[00:10:27] with the group that researchers at Microsoft and elsewhere have called Salt Typhoon.
[00:10:31] They say that they're out, essentially, but U.S. officials say that they're not so sure.
[00:10:35] A number of people we spoke to who are deeply involved in the investigation here
[00:10:39] said that they were surprised to see these statements from some of the carriers
[00:10:43] and that the compromises were so deep and so vast within the major telecommunications networks
[00:10:50] that it's really going to be hard to definitively say that they are fully out of the network
[00:10:56] and to do so at this stage might be somewhat premature.
[00:10:59] And of course, we have a new administration coming in a few weeks,
[00:11:02] which is resulting in the resignation of a number of senior cyber officials who have been dealing with this.
[00:11:07] Jenny Staley, the director of the Cybersecurity Infrastructure Security Agency,
[00:11:10] Harry Koch, the national cyber director.
[00:11:12] So how much of a challenge does this present for the incoming administration?
[00:11:15] It's a huge challenge for the incoming Trump administration and some officials,
[00:11:19] including President-elect Trump's nominee to be chairman of the Federal Communications Commission,
[00:11:24] Brendan Carr, have spoken about the telecom hacks and said it's a priority
[00:11:27] and that we need to do more to deter China.
[00:11:29] It's absolutely a key national security issue for them.
[00:11:32] It's unclear what President-elect Trump will do here with China,
[00:11:35] but he's obviously been very, very tough rhetorically on China.
[00:11:39] So it remains to be seen how they're going to address this
[00:11:42] and whether or not they're going to be supportive of these cybersecurity mandates on industry
[00:11:47] that historically Republicans in Congress and elsewhere have been resistant to.
[00:11:52] They often favor more voluntary arrangements for cybersecurity.
[00:11:55] That was our reporter, Dustin Volz.
[00:11:57] And that's it for Tech News Briefing.
[00:11:59] Today's show was produced by Julie Chang with supervising producer Catherine Milsom.
[00:12:04] I'm James Rundle for The Wall Street Journal.
[00:12:06] We'll be back this afternoon with TNB Tech Minute.
[00:12:09] Thanks for listening.

