{"id":19163,"date":"2022-05-28T19:09:03","date_gmt":"2022-05-29T03:09:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/05\/28\/news-12896\/"},"modified":"2022-05-28T19:09:03","modified_gmt":"2022-05-29T03:09:03","slug":"news-12896","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/05\/28\/news-12896\/","title":{"rendered":"The Mystery of China\u2019s Sudden Warnings About US Hackers"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/628ec795e9a46d033b3380bf\/master\/pass\/china_hack_sec_GettyImages-1227542409.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Thu, 26 May 2022 11:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/matt-burgess\">Matt Burgess<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">For the best<\/span> part of a decade, US officials and cybersecurity companies have been naming and shaming hackers they believe work for the Chinese government. These hackers <a href=\"https:\/\/www.wired.com\/2013\/02\/chinese-army-linked-to-hacks\/\">have stolen<\/a> terabytes of data from companies like pharmaceutical and <a href=\"https:\/\/www.wired.com\/story\/chinese-hackers-charged-decade-long-crime-spying-spree\/\">video game firms<\/a>, <a href=\"https:\/\/www.wired.com\/story\/fbi-takes-drastic-step-to-fight-china-hacking-spree\/\">compromised servers<\/a>, <a href=\"https:\/\/www.wired.com\/story\/the-full-story-of-the-stunning-rsa-hack-can-finally-be-told\/\">stripped security protections<\/a>, and <a href=\"https:\/\/www.wired.com\/story\/china-nsa-hacking-tool-epme-hijack\/\">highjacked hacking tools<\/a>, according to security experts. And as <a href=\"https:\/\/www.wired.com\/story\/china-hacking-reckless-new-phase\/\">China\u2019s alleged hacking has grown more brazen<\/a>, individual Chinese hackers face indictments. However, things may be changing.<\/p>\n<p class=\"paywall\">Since the start of 2022, China\u2019s Foreign Ministry and the country\u2019s cybersecurity firms have increasingly been calling out alleged US cyberespionage. Until now, these allegations have been a rarity. But the disclosures come with a catch: They appear to rely on years-old technical details, which are already publicly known and don\u2019t contain fresh information. The move may be a strategic change for China as the nation tussles to cement its position as a tech superpower.<\/p>\n<p>This content can also be viewed on the site it <a href=\"https:\/\/player.spokenlayer.net\/v1-wired-homepage?__v=linear&amp;url=http:\/\/www.wired.com\/story\/china-us-hacking-accusations\" target=\"_blank\" rel=\"nofollow noreferrer\" class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA ConsentBannerLink-godHGj eTiIvU fhieGc hyLauq\">originates<\/a> from.<\/p>\n<p class=\"paywall\">\u201cThese are useful materials for China\u2019s tit-for-tat propaganda campaigns when they faced US accusation and indictment of China\u2019s cyberespionage activities,\u201d says Che Chang, a cyber threat analyst at the Taiwan-based cybersecurity firm TeamT5.<\/p>\n<p class=\"paywall\">China\u2019s accusations, which were <a data-offer-url=\"https:\/\/riskybiznews.substack.com\/p\/risky-biz-news-china-complains-about\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/riskybiznews.substack.com\/p\/risky-biz-news-china-complains-about&quot;}\" href=\"https:\/\/riskybiznews.substack.com\/p\/risky-biz-news-china-complains-about\" rel=\"nofollow noopener\" target=\"_blank\">noted<\/a> by security journalist Catalin Cimpanu, all follow a very similar pattern. On February 23, Chinese security company Pangu Lab <a data-offer-url=\"https:\/\/www.pangulab.cn\/post\/the_bvp47_a_top-tier_backdoor_of_us_nsa_equation_group\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.pangulab.cn\/post\/the_bvp47_a_top-tier_backdoor_of_us_nsa_equation_group\/&quot;}\" href=\"https:\/\/www.pangulab.cn\/post\/the_bvp47_a_top-tier_backdoor_of_us_nsa_equation_group\/\" rel=\"nofollow noopener\" target=\"_blank\">published<\/a> allegations that the US National Security Agency\u2019s elite <a data-offer-url=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2015_equation-group-the-crown-creator-of-cyber-espionage\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.kaspersky.com\/about\/press-releases\/2015_equation-group-the-crown-creator-of-cyber-espionage&quot;}\" href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2015_equation-group-the-crown-creator-of-cyber-espionage\" rel=\"nofollow noopener\" target=\"_blank\">Equation Group<\/a> hackers used a backdoor, dubbed Bvp47, to monitor 45 countries. The <em>Global Times<\/em>, a tabloid newspaper that\u2019s part of China\u2019s state-controlled media, ran an <a data-offer-url=\"https:\/\/www.globaltimes.cn\/page\/202202\/1252952.shtml\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.globaltimes.cn\/page\/202202\/1252952.shtml&quot;}\" href=\"https:\/\/www.globaltimes.cn\/page\/202202\/1252952.shtml\" rel=\"nofollow noopener\" target=\"_blank\">exclusive report<\/a> on the research. Weeks later, on March 14, the newspaper had a second <a data-offer-url=\"https:\/\/www.globaltimes.cn\/page\/202203\/1254856.shtml\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.globaltimes.cn\/page\/202203\/1254856.shtml&quot;}\" href=\"https:\/\/www.globaltimes.cn\/page\/202203\/1254856.shtml\" rel=\"nofollow noopener\" target=\"_blank\">exclusive story about another<\/a> NSA tool, NOPEN, based on details from China\u2019s National Computer Virus Emergency Response Center. A week later, Chinese cybersecurity firm Qihoo 360 <a data-offer-url=\"https:\/\/finance.yahoo.com\/news\/china-cybersecurity-firm-alleges-us-093000291.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/finance.yahoo.com\/news\/china-cybersecurity-firm-alleges-us-093000291.html&quot;}\" href=\"https:\/\/finance.yahoo.com\/news\/china-cybersecurity-firm-alleges-us-093000291.html\" rel=\"nofollow noopener\" target=\"_blank\">alleged<\/a> that US hackers had been attacking Chinese companies and organizations. And on April 19, the <em>Global Times<\/em> <a data-offer-url=\"https:\/\/www.globaltimes.cn\/page\/202204\/1259749.shtml\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.globaltimes.cn\/page\/202204\/1259749.shtml&quot;}\" href=\"https:\/\/www.globaltimes.cn\/page\/202204\/1259749.shtml\" rel=\"nofollow noopener\" target=\"_blank\">reported<\/a> on further National Computer Virus Emergency Response Center findings about HIVE, malware developed by the CIA.<\/p>\n<p class=\"paywall\">The reports are accompanied with a flurry of statements\u2014often in response to questions from the media\u2014by China\u2019s Foreign Ministry spokespeople. \u201cChina is gravely concerned over the irresponsible malicious cyber activities of the US government,\u201d Foreign Ministry spokesperson Wang Wenbin <a data-offer-url=\"http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202204\/t20220420_10670511.htm\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202204\/t20220420_10670511.htm&quot;}\" href=\"http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202204\/t20220420_10670511.htm\" rel=\"nofollow noopener\" target=\"_blank\">said<\/a> in April after one of the announcements. \u201cWe urge the US side to explain itself and immediately stop such malicious activities.\u201d Over the first nine days of May, Foreign Ministry spokespeople commented on US cyber <a data-offer-url=\"http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202205\/t20220505_10681955.htm\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202205\/t20220505_10681955.htm&quot;}\" href=\"http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202205\/t20220505_10681955.htm\" rel=\"nofollow noopener\" target=\"_blank\">activities<\/a> at least <a data-offer-url=\"http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202205\/t20220506_10682555.htm\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202205\/t20220506_10682555.htm&quot;}\" href=\"http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202205\/t20220506_10682555.htm\" rel=\"nofollow noopener\" target=\"_blank\">three<\/a> <a data-offer-url=\"https:\/\/www.fmprc.gov.cn\/mfa_eng\/xwfw_665399\/s2510_665401\/2511_665403\/202205\/t20220509_10683549.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.fmprc.gov.cn\/mfa_eng\/xwfw_665399\/s2510_665401\/2511_665403\/202205\/t20220509_10683549.html&quot;}\" href=\"https:\/\/www.fmprc.gov.cn\/mfa_eng\/xwfw_665399\/s2510_665401\/2511_665403\/202205\/t20220509_10683549.html\" rel=\"nofollow noopener\" target=\"_blank\">times<\/a>. \u201cOne cannot whitewash himself by smearing others,\u201d Zhao Lijian said in <a data-offer-url=\"http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202205\/t20220505_10681955.htm\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202205\/t20220505_10681955.htm&quot;}\" href=\"http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202205\/t20220505_10681955.htm\" rel=\"nofollow noopener\" target=\"_blank\">one instance<\/a>.<\/p>\n<p class=\"paywall\">While cyber activity undertaken by state actors is often wrapped in highly classified files, many hacking tools developed by the US are no longer secret. In 2017, WikiLeaks published 9,000 documents in the <a href=\"https:\/\/www.wired.com\/tag\/vault-7\/\">Vault7 leaks<\/a>, which detailed many of the CIA\u2019s tools. A year earlier, the mysterious <a href=\"https:\/\/www.wired.com\/tag\/shadow-brokers\/\">Shadow Brokers<\/a> hacking group stole data from one of the NSA\u2019s elite hacking teams and slowly dripped the data to the world. The Shadow Brokers leaks included dozens of exploits and new <a href=\"https:\/\/www.wired.com\/2016\/08\/shadow-brokers-mess-happens-nsa-hoards-zero-days\/\">zero-days<\/a>\u2014including the <a href=\"https:\/\/www.wired.com\/story\/eternalblue-leaked-nsa-spy-tool-hacked-world\/\">Eternal Blue<\/a> hacking tool, which has since been used repeatedly in some of the <a href=\"https:\/\/www.wired.com\/story\/eternalblue-leaked-nsa-spy-tool-hacked-world\/\">largest cyberattacks<\/a>. Many of the details in the Shadow Brokers leaks match up with details about NSA which were <a href=\"https:\/\/www.wired.com\/2013\/12\/nsa-hacking-catalogue\/\">disclosed by Edward Snowden in 2013<\/a>. (An NSA spokesperson said it has \u201cno comment\u201d for this story; the agency routinely does not comment on its activities.)<\/p>\n<p class=\"paywall\">Ben Read, director of cyberespionage analysis at the US cybersecurity firm Mandiant, says China\u2019s state media push of alleged US hacking seems to be consistent, but it mostly contains older information. \u201cEverything that I&#x27;ve seen they&#x27;ve written about, they tie back to the US through either the Snowden leaks or Shadow Brokers,\u201d Read says.<\/p>\n<p class=\"paywall\">Pangu Lab\u2019s February report on Bvp47\u2014the only publication on its website\u2014says it initially discovered the details in 2013 but pieced them together after the Shadow Brokers leaks in 2017. \u201cThe report was based on a decade-old malware, and the decryption key is the same\u201d as in WikiLeaks, Che says. The details of HIVE and NOPEN have also been available for years. Neither Pangu Labs or Qihoo 360, which has been on the <a data-offer-url=\"https:\/\/sg.news.yahoo.com\/us-slaps-sanctions-33-chinese-095408321.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/sg.news.yahoo.com\/us-slaps-sanctions-33-chinese-095408321.html&quot;}\" href=\"https:\/\/sg.news.yahoo.com\/us-slaps-sanctions-33-chinese-095408321.html\" rel=\"nofollow noopener\" target=\"_blank\">US government sanctions list since 2020<\/a>, responded to requests for comment on their research or methodology. A Pangu spokesperson previously <a data-offer-url=\"https:\/\/finance.yahoo.com\/news\/chinese-report-suspected-nsa-hack-110731710.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/finance.yahoo.com\/news\/chinese-report-suspected-nsa-hack-110731710.html&quot;}\" href=\"https:\/\/finance.yahoo.com\/news\/chinese-report-suspected-nsa-hack-110731710.html\" rel=\"nofollow noopener\" target=\"_blank\">said<\/a> it recently published the old details, and it had taken a long time to analyze the data.<\/p>\n<p class=\"paywall\">Megha Pardhi, a <a data-offer-url=\"https:\/\/thediplomat.com\/2022\/04\/chinas-new-focus-on-us-cyber-activities\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/thediplomat.com\/2022\/04\/chinas-new-focus-on-us-cyber-activities\/&quot;}\" href=\"https:\/\/thediplomat.com\/2022\/04\/chinas-new-focus-on-us-cyber-activities\/\" rel=\"nofollow noopener\" target=\"_blank\">China researcher<\/a> at Takshashila Institution, an Indian think tank, says the publications and follow-up comments from officials can serve multiple purposes. Internally, China can use it for propaganda and to send a message to the US that it has the capability to attribute cyber activity. But beyond this, there is a warning to other countries, Pardhi says. \u201cThe message is that even though you&#x27;re allied with the United States, they&#x27;re still gonna come after you.\u201d<\/p>\n<p class=\"paywall\">\u201cWe oppose and crack down in accordance with law all forms of cyberespionage and attacks,\u201d Liu Pengyu, a spokesperson for the Chinese Embassy in the US, says in a statement. Liu did not respond directly to questions around the apparent uptick in finger-pointing at the US this year, the evidence that was being used to do so, or why this may be happening years after details originally emerged. China is widely considered to be one of the most sophisticated and active state cyber actors\u2014involved in spying, hacking for espionage, and gathering data. <a data-offer-url=\"https:\/\/www.gov.uk\/government\/speeches\/cs-speech-to-the-international-institute-for-strategic-studies\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.gov.uk\/government\/speeches\/cs-speech-to-the-international-institute-for-strategic-studies&quot;}\" href=\"https:\/\/www.gov.uk\/government\/speeches\/cs-speech-to-the-international-institute-for-strategic-studies\" rel=\"nofollow noopener\" target=\"_blank\">Western officials consider<\/a> the country to be the biggest cyber threat, ahead of Russia, Iran, and North Korea.<\/p>\n<p class=\"paywall\">\u201cRecently, there have been many reports of US carrying cybertheft and attacks on China and the whole world,\u201d Liu says in a statement that reflects comments made by China\u2019s Foreign Ministry spokespeople this year. \u201cThe US should reflect on itself and join others to jointly safeguard peace and security in cyberspace with a responsible attitude.\u201d<\/p>\n<p class=\"paywall\">Many of the disclosures in 2022\u2014there are only a <a data-offer-url=\"https:\/\/www.reuters.com\/article\/us-china-usa-cia-idUSKBN20Q2SI\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.reuters.com\/article\/us-china-usa-cia-idUSKBN20Q2SI&quot;}\" href=\"https:\/\/www.reuters.com\/article\/us-china-usa-cia-idUSKBN20Q2SI\" rel=\"nofollow noopener\" target=\"_blank\">handful of previous Chinese accusations<\/a> against the US\u2014stem from private cybersecurity companies. This is similar to how Western cybersecurity companies report their findings; they are not always incorporated into government talking points, however, and state-backed media is all but nonexistent.<\/p>\n<p class=\"paywall\">The potential shift in tactics could play into wider policies around technology use and development. In recent years, China\u2019s policies have focused on positioning itself as a <a data-offer-url=\"https:\/\/carnegieendowment.org\/2021\/10\/28\/three-takeaways-from-china-s-new-standards-strategy-pub-85678\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/carnegieendowment.org\/2021\/10\/28\/three-takeaways-from-china-s-new-standards-strategy-pub-85678&quot;}\" href=\"https:\/\/carnegieendowment.org\/2021\/10\/28\/three-takeaways-from-china-s-new-standards-strategy-pub-85678\" rel=\"nofollow noopener\" target=\"_blank\">dominant force in technology standards<\/a> in everything from 5G to quantum computers. A raft of new <a href=\"https:\/\/www.wired.com\/story\/china-personal-data-law-pipl\/\">cybersecurity and privacy laws<\/a> have detailed how companies should handle data and protect national information\u2014including the potential for <a data-offer-url=\"https:\/\/breakingdefense.com\/2021\/09\/chinas-new-data-security-law-will-provide-it-early-notice-of-exploitable-zero-days\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/breakingdefense.com\/2021\/09\/chinas-new-data-security-law-will-provide-it-early-notice-of-exploitable-zero-days\/&quot;}\" href=\"https:\/\/breakingdefense.com\/2021\/09\/chinas-new-data-security-law-will-provide-it-early-notice-of-exploitable-zero-days\/\" rel=\"nofollow noopener\" target=\"_blank\">hoarding previously unknown vulnerabilities<\/a>.<\/p>\n<p class=\"paywall\">\u201cOne explanation is, possibly, that we are engaged in a kind of ideological\u2014or if you want to put it more prosaically, a marketing\u2014battle with China,\u201d says Suzanne Spaulding, a senior adviser at the Center for Strategic and International Studies and previously a senior cybersecurity official in the Obama administration. The US-China relationship has been fraught in recent years, with tensions rising over national security issues, including concerns about the <a href=\"https:\/\/www.wired.com\/story\/us-feds-battle-against-huawei\/\">telecom giant Huawei<\/a>. \u201cChina is offering, around the world, a competing model to Western-style democracy,\u201d Spaulding says, noting that China may be responding to Western countries coming together on multiple issues since Russia invaded <a href=\"https:\/\/www.wired.com\/tag\/ukraine\/\">Ukraine<\/a>.<\/p>\n<p class=\"paywall\">In July 2021, China\u2019s Ministry of Industry and Information Technology <a data-offer-url=\"https:\/\/web.archive.org\/web\/20210713153324\/https:\/\/www.scmp.com\/tech\/policy\/article\/3140963\/china-drafts-three-year-plan-boost-its-cybersecurity-industry-amid\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/web.archive.org\/web\/20210713153324\/https:\/\/www.scmp.com\/tech\/policy\/article\/3140963\/china-drafts-three-year-plan-boost-its-cybersecurity-industry-amid&quot;}\" href=\"https:\/\/web.archive.org\/web\/20210713153324\/https:\/\/www.scmp.com\/tech\/policy\/article\/3140963\/china-drafts-three-year-plan-boost-its-cybersecurity-industry-amid\" rel=\"nofollow noopener\" target=\"_blank\">published plans<\/a> to boost the private security industry by 2023. Companies based in China should spend more on their defenses against cyberattacks, the government department said at the time. It also said the whole cybersecurity industry within China should look to grow in size in the coming years, as well as bolster the development of network monitoring systems and threat detection techniques. \u201cWhat we&#x27;ve started to see over the last couple of years, increasingly, is that companies in China are building their own capabilities,\u201d says Adam Meyers, head of intelligence at the US cybersecurity firm CrowdStrike. \u201cThere&#x27;s been a few that have waded into the threat intelligence space.\u201d<\/p>\n<p class=\"paywall\">But publicizing details of the long-known incidents still raises plenty of questions. Mandiant\u2019s Read says he wonders exactly how many cyberespionage cases Chinese companies and authorities are finding. The answer would provide significant clues about their true capabilities. Read says: \u201cIs this 50 percent of what they&#x27;re finding? Is this 1 percent of what they&#x27;re finding? Is this 90 percent of what they&#x27;re finding?\u201d<\/p>\n<p class=\"paywall\">The move appears to be strategic, says TeamT5\u2019s Che. \u201cConsidering the close relationship between China&#x27;s cybersecurity firms and the Chinese government, our team surmises that these reports could be a part of China\u2019s strategic distraction when they are accused of massive surveillance systems and espionage operations.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/china-us-hacking-accusations\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/628ec795e9a46d033b3380bf\/master\/pass\/china_hack_sec_GettyImages-1227542409.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Thu, 26 May 2022 11:00:00 +0000<\/strong><\/p>\n<p>The Chinese government recently began saber-rattling about American cyberespionage. The catch? It\u2019s all old news.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-19163","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19163"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19163\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}