WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness – Chinese Cyber Threats to Critical Infrastructure
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – Chinese Cyber Threats to Critical Infrastructure

Author: Alec Davison

Created: Tuesday, September 19, 2023 - 18:40

Categories: Cybersecurity, Security Preparedness

Chinese state-sponsored cyber actors represent one of the most pervasive cyber threats facing the U.S. and its Western allies today. In the event of a conflict with the U.S., China would likely launch destructive attacks against critical infrastructure in the homeland, according to the Department of Defense’s (DoD’s) latest Cyber Strategy.

The DoD strategy states that China poses a broad and pervasive cyber espionage threat, with Chinese threat actors routinely conducting malicious cyber activity against the U.S. and its Western allies. Indeed, over the summer, WaterISAC reported on multiple instances of Chinese advanced persistent threat (APT) activity targeting critical infrastructure, specifically related to APT Volt Typhoon. Similarly, last month, CISA Director Jen Easterly warned the increasing malicious activity of Chinese threat actors was alarming because U.S. officials spent more than a decade defending against Chinese cyber attacks that focused on espionage, theft of financial and technological data. But now more recently, China’s cyber actors are positioning themselves to conduct destructive cyberattacks on U.S. critical infrastructure. For instance, in July, the New York Times reported the U.S. government found Chinese threat actors had gained access to the networks of power grids, communications systems, and water supplies for military bases within the U.S. and abroad. The threat actors behind these campaigns, Volt Typhoon, have employed a technique called “living off the land,” where they use victims’ existing computer processes rather than introducing new malicious software, which makes them harder to detect. The tactics, techniques, and procedures and indicators of compromise were highlighted in a joint Cybersecurity Advisory (AA23-144a) published in May. The EPA also recently released a supplemental advisory to the one noted above, members are encouraged to review the advisory’s IOCs and update their network defenses accordingly. Read the full DoD Cyber Strategy or read a related news article here.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar