At a glance.
- US hunts Chinese malware staged in US networks.
- SVR cyberespionage on several fronts.
- The FSB shakes up its infrastructure.
- C2-as-a-service (and APTs are the customers).
- Five Eyes warn against top exploited vulnerabilities.
- Patch news.
- Crime and punishment.
- Courts and torts.
- Policies, procurements, and agency equities.
- Fortunes of commerce.
- Labor markets.
US hunts Chinese malware staged in US networks.
On Saturday the New York Times, citing unnamed Administration officials, reported that the US was hunting for disruptive Chinese malware that's been quietly staged in US systems. The Times' report is the result of interviews conducted over the past two months. The consensus among both government and industry experts is that Volt Typhoon precedes Microsoft's report "by at least a year." Investigation has shown that the Chinese campaign is more widespread than initially believed, and that the US work to find and "eradicate" the malware has been in progress for some time. The infestation extends beyond telecommunication systems and is, geographically global, not confined to Guam or even to US territory, but there do seem to be higher concentrations of the malware in the vicinity of US military installations.