{"id":27777,"date":"2026-04-27T09:38:11","date_gmt":"2026-04-27T09:38:11","guid":{"rendered":"https:\/\/biblelon.com\/?p=27777"},"modified":"2026-04-27T09:38:11","modified_gmt":"2026-04-27T09:38:11","slug":"u-s-warns-of-china-backed-cyber-threat-targeting-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/biblelon.com\/?p=27777","title":{"rendered":"U.S. Warns of China-Backed Cyber Threat Targeting Critical Infrastructure"},"content":{"rendered":"<p>\n              <span class=\"span-reading-time rt-reading-time\"><span class=\"rt-label rt-prefix\">Reading Time:<\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span><\/p>\n<p data-start=\"0\" data-end=\"323\">Growing concerns over cybersecurity threats are prompting urgent warnings from U.S. officials and international allies, as China-linked hackers increasingly target critical infrastructure and government systems. With compromised devices forming vast covert networks, experts say the threat is both persistent and expanding.\n<\/p>\n<h4 data-start=\"0\" data-end=\"323\">Visit your state page to pray.<\/h4>\n<p>\u00a0<\/p>\n<p data-start=\"325\" data-end=\"342\">From The Epoch Times:\n<\/p>\n<p data-start=\"344\" data-end=\"554\">The United States and global partners issued an advisory on Thursday, warning about the threat posed by China-backed hackers using online networks of compromised devices to attack governments and organizations.\n<\/p>\n<p data-start=\"556\" data-end=\"774\">\u201cThese networks are mainly made up of compromised Small Office Home Office (SOHO) routers, as well as \u2026 smart devices,\u201d reads the April 23 joint advisory published by the <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Cybersecurity and Infrastructure Security Agency<\/span><\/span> (CISA).\n<\/p>\n<p data-start=\"776\" data-end=\"1042\">\u201cThe NCSC believes that the majority of China-nexus threat actors are using these networks, that multiple covert networks have been created and are being constantly updated, and that a single covert network could be being used by multiple actors,\u201d the advisory said.\n<\/p>\n<p data-start=\"776\" data-end=\"1042\">\n<p data-start=\"1044\" data-end=\"1566\">The advisory highlights how these covert networks allow malicious actors to mask their identity while launching cyberattacks across the globe. By exploiting everyday devices like routers, cameras, and storage systems, hackers can build massive, low-cost infrastructures capable of targeting governments, businesses, and even critical national systems. Groups linked to China, including Flax Typhoon and Volt Typhoon, have already used such methods to conduct espionage and position themselves for potential future attacks.\n<\/p>\n<p data-start=\"1568\" data-end=\"2060\">In response, U.S. agencies are taking steps to counter these threats, including restricting foreign-made networking equipment and increasing scrutiny of Chinese-linked technology companies. Officials warn that allowing vulnerable devices to dominate the market poses serious risks not only to cybersecurity but also to national sovereignty. With China identified as one of the most persistent cyber threats, the stakes for safeguarding America\u2019s digital infrastructure have never been higher.\n<\/p>\n<p data-start=\"2062\" data-end=\"2301\">This is a critical moment to pray for protection over our nation\u2019s systems and leaders. Let\u2019s ask God to expose hidden threats, strengthen our defenses, and give wisdom to those responsible for safeguarding our security.\n<\/p>\n<p data-start=\"2062\" data-end=\"2301\">\n<h4 data-start=\"2303\" data-end=\"2395\">Pray for protection over America\u2019s infrastructure and share this article to raise awareness.<\/h4>\n<p data-start=\"2303\" data-end=\"2395\" data-is-last-node=\"\" data-is-only-node=\"\">(Excerpt from The Epoch Times. Photo Credit: Tunvarat Pruksachat\/Getty Images)<br \/>\n&#13;\n            <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reading Time: 2 minutes Growing concerns over cybersecurity threats are prompting urgent warnings from U.S. officials and international allies, as China-linked hackers increasingly target critical infrastructure and government systems. With compromised devices forming vast covert networks, experts say the threat is both persistent and expanding. Visit your state page to pray. \u00a0 From The Epoch<\/p>\n","protected":false},"author":1,"featured_media":27778,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[9178,589,9179,8401,2533,1390,2891,175],"class_list":{"0":"post-27777","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-prayer","8":"tag-chinabacked","9":"tag-critical","10":"tag-cyber","11":"tag-infrastructure","12":"tag-targeting","13":"tag-threat","14":"tag-u-s","15":"tag-warns"},"_links":{"self":[{"href":"https:\/\/biblelon.com\/index.php?rest_route=\/wp\/v2\/posts\/27777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/biblelon.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/biblelon.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/biblelon.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/biblelon.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=27777"}],"version-history":[{"count":0,"href":"https:\/\/biblelon.com\/index.php?rest_route=\/wp\/v2\/posts\/27777\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/biblelon.com\/index.php?rest_route=\/wp\/v2\/media\/27778"}],"wp:attachment":[{"href":"https:\/\/biblelon.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=27777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/biblelon.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=27777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/biblelon.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=27777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}