December 05, 2025 03:42 pm (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
'Mamata fooled Muslims': Humayun Kabir explodes after TMC suspends him over 'Babri Masjid-style mosque' demand; announces new party | Mosque in the middle of Kolkata airport? Centre confirms flight risks, BJP fires at Mamata | Sam Altman is betting big on India! OpenAI in advanced talks with Tata to build AI infrastructure | Government removes mandatory pre-installation of Sanchar Saathi App. Know all details | Calcutta HC overturns controversial Bengal job annulment — 32,000 teachers rejoice! | Bengal SIR shock: 1 lakh ‘deceased voters’ found in Kolkata North! | Massive twist in Bengal voter list: ‘Perfect’ 2,280 booths shrink to just 480 after probe! | ‘Red carpet for intruders?’: Supreme Court raps petitioner in Rohingya case | Sanchar Saathi app row: Scindia shuts down Congress' ‘snooping’ charge — here’s what he said | Layoff alert! Marketing giant Omnicom to slash 4,000 jobs and shut historic ad agencies after IPG takeover
China
A Chinese flag. Photo: Unsplash

NSA, others guide to counter China's state-sponsored actors

| @indiablooms | Aug 29, 2025, at 07:23 pm

The National Security Agency (NSA) and other U.S. and foreign organisations are releasing a joint Cybersecurity Advisory to expose advanced persistent threat (APT) actors sponsored by the Chinese government targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally and outline appropriate mitigation guidance.

The malicious activity outlined in the advisory partially overlaps with cybersecurity industry reporting on Chinese state-sponsored threat actors referred to by names such as Salt Typhoon.

These activities have been linked to multiple China-based entities—including Sichuan Juxinhe Network Technology Co. Ltd., Beijing Huanyu Tianqiong Information Technology Co., Ltd., and Sichuan Zhixin Ruijie Network Technology Co., Ltd.—which provide cyber products and services to China’s Ministry of State Security and People’s Liberation Army.

The CSA, “Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System,” details specific tactics, techniques, and procedures (TTPs) these actors have been found using for initial exploitation, persistence, collection, and exfiltration. Indicators of compromise (IOCs) and common vulnerabilities and exposures (CVEs) exploited by the APT actors are also detailed.

Further, the report provides threat hunting guidance and specific mitigations that organisations are encouraged to implement to search for malicious activity and reduce the threat of Chinese state-sponsored and other APT actors.

These recommendations are especially important for network defenders of telecommunications and critical infrastructure organisations to discover unknown intrusions and prevent undetected malicious activity on their networks.

By utilising the outlined guidance, organisations can also better provide compromise details information to appropriate authorities to continue improving all parties’ understanding of initial access methods.

When threat hunting, the authoring agencies advise that organisations gain a full understanding of the APT actors’ accesses before implementing visible incident response and mitigation actions to maximise the chance of achieving full eviction from compromised networks.

This CSA is being released by the following authoring and co-sealing agencies:

United States National Security Agency (NSA)

United States Cybersecurity and Infrastructure Security Agency (CISA)

United States Federal Bureau of Investigation (FBI)

United States Department of Defense Cyber Crime Center (DC3)

Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)

Canadian Centre for Cyber Security (Cyber Centre)

Canadian Security Intelligence Service (CSIS)

New Zealand National Cyber Security Centre (NCSC-NZ)

United Kingdom National Cyber Security Centre (NCSC-UK)

Czech Republic National Cyber and Information Security Agency (NÚKIB)

Finnish Security and Intelligence Service (SUPO)

Germany Federal Intelligence Service (BND)

Germany Federal Office for the Protection of the Constitution (BfV)

Germany Federal Office for Information Security (BSI)

Italian External Intelligence and Security Agency (AISE)

Italian Internal Intelligence and Security Agency (AISI)

Japan National Cyber Office (NCO)

Japan National Police Agency (NPA)

Netherlands Defence Intelligence and Security Service (MIVD)

Netherlands General Intelligence and Security Service (AIVD)

Polish Military Counterintelligence Service (SKW)

Polish Foreign Intelligence Agency (AW)

Spain National Intelligence Centre (CNI)

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.