You are currently viewing U.S. Intelligence: China Admitted Running Volt Typhoon Hack Attacks

U.S. Intelligence: China Admitted Running Volt Typhoon Hack Attacks

In a surprising development, Chinese officials reportedly admitted to conducting the Volt Typhoon cyberattacks aimed at U.S. critical infrastructure during a confidential meeting with U.S. counterparts last December, according to sources cited by The Wall Street Journal. The acknowledgment, made in Geneva, allegedly tied the operations to escalating U.S. support for Taiwan, raising concerns about geopolitical tensions spilling into cyberspace.

The Volt Typhoon campaign, first exposed by Microsoft in May 2023, has been described as a sophisticated effort by state-sponsored Chinese hackers to infiltrate vital U.S. systems, including communications, energy, transportation, and water sectors. U.S. authorities, including the FBI and Cybersecurity and Infrastructure Security Agency (CISA), have warned that the group’s activities appear designed to preposition for potential disruption in the event of a conflict, particularly over Taiwan.

During the Geneva talks, Chinese representatives reportedly framed the cyberattacks as a response to U.S. policies, though Beijing has publicly denied any involvement, dismissing accusations as a “political farce” meant to justify American surveillance. China’s National Computer Virus Emergency Response Center has previously claimed the Volt Typhoon narrative was fabricated by the U.S. to secure funding and bolster its own cyber capabilities.

The admission, if accurate, marks a rare instance of China acknowledging offensive cyber operations, though the secretive nature of the meeting leaves room for skepticism. Neither U.S. nor Chinese officials have officially confirmed the report, and details remain murky. The revelation comes amid heightened U.S.-China friction, with Taiwan remaining a flashpoint.

U.S. cybersecurity officials continue to urge critical infrastructure organizations to strengthen defenses against such threats, emphasizing timely patching, multifactor authentication, and replacing outdated devices. The FBI disrupted parts of Volt Typhoon’s network in January 2024, but experts warn the group remains active, exploiting vulnerabilities in routers and other edge devices to maintain persistent access.

As both nations navigate this shadow war in cyberspace, the reported admission underscores the growing challenge of deterring state-backed hacking while avoiding broader escalation. For now, the U.S. is left grappling with how to respond to a threat that could disrupt the backbone of its society—potentially at a moment’s notice.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. Summitsystemsissp assumes no liability for the accuracy or consequences of using this information