• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 

IT Worker arrested for selling access in $100M PIX cyber heist

 | 

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

 | 

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

 | 

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Cyber warfare
  • Intelligence
  • Security
  • China, cyber warfare and challenges for the future

China, cyber warfare and challenges for the future

Pierluigi Paganini April 09, 2012

When discuss on cyber warfare we cannot regardless of the role played by nations such as China, U.S. and Russia. In particular, the Beijing government has distinguished itself in recent years for two key aspects:

  • the aggressive strategy cyber conduct towards foreign countries
  • the country’s willingness to become independent from the technological

The second aspect is crucial and strongly correlated to the first, in recent years the technology push of the Asian country was disarming and it’s one of the principal reason for its success. Despite the situation inside the country presented considerable economic hardship in rural areas the central government has invested and encouraged private companies to invest in various capacities for develop and acquire technological know-how.

As I said the two aspects are highly correlated, China through private companies and groups of sponsored hackers have promoted several operations with the purpose of acquiring sensitive information on foreign technology projects, in more than one occasion has been conducting cyber espionage against companies and governments of other nations. An aggressive strategy that has not spared anyone, sometimes with devastating consequences for victims, as in the case of Nortel ended up in bankruptcy.
I would introduce the concept of strategy of espionage, concerted actions planned with meticulous attention against strategic objectives, innovative techniques of espionage that have introduced a massive use of malware to infect systems to spy on, the use of operations as a diversionary attacks DDoS to conceal other operations, the choice of auxiliary vulnerable targets such as contractors to access data from governments and government agencies.

China have done and is doing everything is possible to be independent from other countries like US and Japan for critical technologies, the espionage is just the dark side of the effort spent. The 2006 Medium to Long Term Plan on Science and Technology (MLP) announced

“Facts have proved that, in areas critical to the national economy and security, core technologies cannot be purchased.”

There is strong commitment to develop inside the country sensible technology to not give any kind of advantage to foreign industries. Let’s consider another crucial factor, the relative low cost of manufacturing in China has attracted several foreign companies and their production in the country giving to the nation a great advantage. In my opinion once the production is decentralized in other countries is utopic to try to maintain any secret.
Reduce costs is essential for a globalized business but is could be an high risk, a thriving business today could be transformed in future disaster due production secret exposure.

The MLP sets the goal of China becoming an “innovative nation” by 2020 and a “global scientific power” by 2050, the objectives are really ambitious but feasible in my opinion.

Looking into the future projection which scenario we should expect?

China’s growth in terms of technology and strengthening its presence in cyber space will no doubt to the increase in cyber operations against the nation itself. Many industry experts believe that due to imbalance between a cyber offence strategy so aggressive and its cyber defense policy could not be origin of significant technological problems for China.

China over the years has benefited from a surprise effect due to the lack of government information on cyber security and a lack of awareness of the cyber threats. Today the scenario has changed profoundly, every nation is striving for the establishment of a cyber appropriate strategy that can guarantee the security of the nation in terms of technology. In this context, offend and spying is certainly more complex than in the past and then what I think is the China will improve its defensive capabilities to preserve the knowledge acquired through years of hard work, research and espionage.

The rise of China and its consolidation may be hampered by a range of phenomena that I try to summarize in the following list:

  • Counterintelligence activities against Chinese companies as an obvious consequence of the expansionist policy of China in the technology sector. Chinese companies will surely object cyber espionage campaigns no less aggressive than those made in previous years. Technological innovation will play a key role in this regard, for example the possibility of using Day 0 esploit in computing could make a difference.  Espionage will affect directly companies but also their final products and their users. The hack of a product distributed on a global scale would have devastating consequences.
  • The pressure exerted by the phenomena of Hacktivism, which could absorb considerable energy on the technological front. The phenomenon is new, widespread and unpredictable growth. Groups like Anonymous have the proven ability to attack the main computing resources of the country, now confined to deface websites but in future they could steal and disclose classified information.
  • The western approach to the Chinese was mainly driven by the will of the West to penetrate promising new markets. Any shift of the center of gravity in global economic might to collapse the Chinese economic model taking the leading companies in the country to deal with a history made of suspicious on state enterprises, an emblematic case of Huawei, China’s emerging technology superpower, has-been dogged by allegations it has close links to military intelligence, for this reason the ITS partnership with Symantec has been broken.
  • The thrust of the new Chinese generation to full opening, characteristic of the Western life style, and that China has always rejects with any kind of censorship. The pressure is growing and will absorb more and more effort in terms of domestic politics.

These four components are the real challenge for the future of a country that has grown like no other …


Is China really ready?

Pierluigi Paganini


facebook linkedin twitter

Anonymous Censorship China Cyber attacks Cyber Crime cyber espionage cyber security cyber strategy cyber threats cyber warfare DDoS Espionage Hackers Hacking Hacktivism hacktivist Intelligence Large scale infiltration malware sponsored hackers

you might also like

Pierluigi Paganini July 11, 2025
U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog
Read more
Pierluigi Paganini July 10, 2025
DoNot APT is expanding scope targeting European foreign ministries
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

    Uncategorized / July 11, 2025

    U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

    Hacking / July 11, 2025

    UK NCA arrested four people over M&S, Co-op cyberattacks

    Cyber Crime / July 10, 2025

    PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

    Hacking / July 10, 2025

    Qantas data breach impacted 5.7 million individuals

    Data Breach / July 10, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT