Get 40% Off
🚨 Volatile Markets? Find Hidden Gems for Serious Outperformance
Find Stocks Now

Chinese Hackers May Control Your Water And Are Laying in Wait, FBI Warns — 3 Startups To Watch

Published 20/04/2024, 13:50
© Reuters.  Chinese Hackers May Control Your Water And Are Laying in Wait, FBI Warns — 3 Startups To Watch

Benzinga - by Anthony Noto, Benzinga Editor.

Chinese state-sponsored hackers are orchestrating advanced attacks that could “wreak havoc” on critical U.S. infrastructure, Federal Bureau of Investigations (FBI) director Christopher Wray said.

“Everything from water-treatment facilities and energy grids to transportation and information technology — form the backbone of our society,” he told attendees at Thursday’s Summit on Modern Conflict in Nashville.

What happens if those things are attacked? Wray warned that such a scenario could occur at any time.

“China is positioning its enormous hacking enterprise — remember, 50 to 1 — for more than ‘just’ the outrageous theft campaign,” he added. “It's using that mass, those numbers, to give itself the ability to physically wreak havoc on our critical infrastructure at a time of its choosing.”

Wray called on private companies to bring “vigilance to the table” and play “a central defensive role to generate vital information about what adversaries are doing — or preparing to do — against us.”

3 OT Startups To Watch According to Wedbush analyst Taz Koujalgi, Wray’s comments “are not alarmist at all.” They underscore the growing importance of OT (operational technology) specialists.

Three firms come to mind:

  • Dragos Inc. is “one of the leading pioneers in the OT sector,” Koujalgi told Benzinga. The Hanover, Maryland-based company has, so far, collected about $440 million in venture capital.
  • New York-based Claroty, which has raised over $635 million in funding to date, secured another $100 million in backing last month.
  • And San Francisco-based Nozomi Networks also clinched $100 million in new funding last month, totaling more than $260 million.
3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

And sourcing capital in the OT sub-sector is especially tough considering venture support is down across the board.

Another challenge: These types of infrastructure attacks are “fairly new” and “fast-moving.”

New software is being written every day, and code from five years ago is in danger of being obsolete as bad actors routinely find holes in that software, Koujalgi explained.

Basically, “it’s hard to keep pace with the bad guys.”

Who Are The Bad Guys? Recall how, in 2023, security analysts at Microsoft Corp. (NASDAQ:MSFT) and Western intelligence agencies uncovered how a state-sponsored Chinese hacking group known as “Volt Typhoon” was spying on various U.S. critical infrastructure organizations.

China and the U.S. routinely spy on each other. But analysts say this incident was one of the most extensive Chinese cyber-espionage campaigns against American critical infrastructure.

China dismissed cyberattack allegations in March as “pure political maneuvering.”

Lin Jian of the Chinese Foreign Ministry urged the U.S. to end “their own cyber aggression against China. "

But, as Wray told it, Volt Typhoon has “persistent PRC access … They were hiding inside our networks, using tactics known as ‘living-off-the-land’ — essentially, exploiting built-in tools that already exist on victim networks to get their sinister job done, tools that network defenders expect to see in use and so don't raise suspicions — while they also operated botnets to further conceal their malicious activity and the fact that it was coming from China. All this, with the goal of giving the Chinese government the ability to wait for just the right moment to deal a devastating blow.”

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

And it’s not just China. There was also a group of hackers called DarkSide that, in 2021, was blamed for the cyberattack on Colonial Pipeline, which led to a complete shutdown.

That same year, a cyberattack on the heavily guarded Natanz plant in Iran took place. The disruption reportedly set back Tehran’s nuclear program by nine months. Neither the U.S. nor Israel acknowledged involvement in what was believed to be a sabotage campaign.

ETFs To Consider: Here are five cybersecurity exchange-traded funds (ETFs) to note:

  • Amplify ETF Trust Amplify Cybersecurity ETF (NYSE:HACK)
  • First Trust NASDAQ Cybersecurity ETF (NASDAQ:CIBR)
  • iShares Cybersecurity and Tech ETF (NYSE:IHAK)
  • WisdomTree Cybersecurity Fund (NASDAQ:WCBR)
  • Global X Cybersecurity ETF (NASDAQ:BUG)

Image: Pixabay

© 2024 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.

Read the original article on Benzinga

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.