China’s Salt Typhoon Hackers Infiltrated the US National Guard for Almost a Year

Recent reports highlight significant cybersecurity incidents, underscoring ongoing concerns about data privacy and system vulnerabilities. A notable case involves an analysis of the FBI’s Jeffrey Epstein prison video, which indicates that roughly 2 minutes and 53 seconds of footage may have been edited out. While there’s no evidence of deceptive manipulation, such alterations raise questions about the integrity of critical evidence and how metadata can reveal potential modifications.

The Department of Homeland Security (DHS) is currently embroiled in controversy over its decision to add DNA samples from approximately 133,000 migrant children and teenagers into a criminal database. Simultaneously, researcher Jeremiah Fowler unveiled serious lapses in data security, disclosing over 2 GB of sensitive information related to adoptions that was left exposed on the open internet, compromising the privacy of biological and adoptive families alike.

In a move to enhance online safety, Roblox has introduced a Trusted Connections feature that utilizes AI for age verification. This system analyzes video selfies of teenagers to determine their eligibility for unfiltered chat access. As technology progresses, AI tools capable of creating deepfakes are becoming increasingly sophisticated. Alongside this, “nudify” platforms leveraging advanced technology from US firms are attracting millions of users and generating substantial revenue.

The Chinese hacker collective known as Salt Typhoon has made headlines with its infiltration of the US National Guard’s network, reportedly gaining access from March to December of last year. A memo from DHS, obtained by non-profit Property of the People, warns that this breach could provide potential data to aid further hacking endeavors, potentially affecting various state cybersecurity organizations. This incident exemplifies persistent threats posed by state-sponsored actors, who leverage persistent access tactics from the MITRE ATT&CK framework.

In another alarming development, the Trump administration is building a new digital system that would allow Immigration and Customs Enforcement (ICE) to access taxpayer data in near real-time. ProPublica recently revealed that this system circumvents traditional IRS safeguards, raising significant civil liberties concerns. Experts warn that the accelerated access to tax data could facilitate ICE’s enforcement actions, heightening vulnerabilities for immigrant communities.

Cybersecurity vulnerabilities extend beyond data accessibility issues to critical infrastructure. The Cybersecurity and Infrastructure Security Agency issued an advisory indicating a zero-day vulnerability affecting trains, potentially allowing hackers to trigger emergency brakes remotely. More troubling is the revelation that this vulnerability has existed for over 7,300 days without being addressed, posing a direct threat to public safety and railway operations. The advisory underlines the need for stringent authentication processes to prevent unauthorized command execution.

Moreover, Google has initiated legal action against the operators of the BadBox 2.0 botnet, a network composed of 10 million Android-enabled televisions that were infected with malware before reaching consumers. The botnet, attributed to Chinese cybercriminals, has been utilized for click fraud and as proxy machines, implicating a significant threat to users globally. Google emphasizes that the BadBox 2.0 botnet is the largest of its kind and continues to grow, affecting millions.

These incidents collectively illustrate a troubling landscape in cybersecurity, revealing that both individual data and critical infrastructures remain under siege. The threats posed by state-sponsored and organized cybercriminals highlight the importance of robust defenses and continuous vigilance in safeguarding sensitive information and operational integrity. As these challenges evolve, businesses must remain informed and proactive, leveraging insights from frameworks like MITRE ATT&CK to enhance their cybersecurity posture.

Source