{"id":162364,"date":"2023-04-17T18:22:42","date_gmt":"2023-04-17T23:22:42","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/04\/what-it-will-look-like-if-china-launches-cyberattacks-in-the-u-s"},"modified":"2023-04-17T18:22:42","modified_gmt":"2023-04-17T23:22:42","slug":"what-it-will-look-like-if-china-launches-cyberattacks-in-the-u-s","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/04\/what-it-will-look-like-if-china-launches-cyberattacks-in-the-u-s","title":{"rendered":"What it will look like if China launches cyberattacks in the U.S."},"content":{"rendered":"<p><\/p>\n<p><iframe style=\"display: block; margin: 0 auto; width: 100%; aspect-ratio: 4\/3; object-fit: contain;\" src=\"https:\/\/www.youtube.com\/embed\/nvAKzkSu26w?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope;\n   picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>Chinese hackers could also attack the networks of companies that provide services to the military or to critical infrastructure operators, holding their systems hostage for ransom payments.<\/p>\n<p>\u201cIf you get the right supply chain, it can have a lot of effects against a lot of targets,\u201d said John Hultquist, head of Mandiant Intelligence Analysis at Google Cloud.<\/p>\n<p>China is viewed as one of the most dangerous nations in cyberspace, and its cyber espionage operations are among some of the U.S. government\u2019s top cyber-related investigations. FBI Director Christopher Wray <a href=\"https:\/\/www.fbi.gov\/news\/speeches\/the-threat-posed-by-the-chinese-government-and-the-chinese-communist-party-to-the-economic-and-national-security-of-the-united-states\" rel=\"nofollow\" target=\"_blank\"> said in 2020<\/a> that his agency opens a new investigation into a Chinese counterintelligence effort every 10 hours, and half of the FBI\u2019s counterintelligence investigations are related to China. And the intelligence community\u2019s threats assessments have long warned that China is \u201calmost certainly capable\u201d of launching disruptive and destructive cyberattacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chinese hackers could also attack the networks of companies that provide services to the military or to critical infrastructure operators, holding their systems hostage for ransom payments. \u201cIf you get the right supply chain, it can have a lot of effects against a lot of targets,\u201d said John Hultquist, head of Mandiant Intelligence Analysis at [\u2026]<\/p>\n","protected":false},"author":661,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1490,418,9],"tags":[],"class_list":["post-162364","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-government","category-internet","category-military"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/162364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/661"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=162364"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/162364\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=162364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=162364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=162364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}