As of November 5, 2024, U.S. infrastructure, military, and policing agencies continue to face a dynamic and evolving cyber threat landscape. Recent incidents underscore the persistent efforts of state-sponsored actors and cybercriminals to compromise critical systems. This report provides a detailed analysis of the latest developments in computer viruses, malware, breaches, and ransomware threats affecting these sectors.
1. Computer Viruses and Malware
1.1. Volt Typhoon Activities
Volt Typhoon, an advanced persistent threat (APT) group linked to the Chinese government, has been active since at least mid-2021. The group primarily targets U.S. sectors, including manufacturing, utilities, transportation, construction, maritime, defense, information technology, and education. Their operations focus on espionage, data theft, and credential access. Notably, Volt Typhoon employs “living-off-the-land” techniques, utilizing legitimate network administration tools to evade detection and blend into normal system activities. This approach complicates detection and mitigation efforts.
1.2. Salt Typhoon Campaign
In recent months, a Chinese state-sponsored hacking group, referred to as Salt Typhoon, has infiltrated several U.S. internet service providers. This campaign aims to access sensitive information and establish a foothold within the telecommunications infrastructure. Investigations are ongoing to determine the extent of the compromise and potential impacts on critical infrastructure.
1.3. Flax Typhoon Disruption
In September 2024, U.S. authorities disrupted a network of over 200,000 routers, cameras, and other internet-connected devices used by a China-based hacking group known as Flax Typhoon. This group had established access to U.S. networks, posing significant risks to critical infrastructure. The operation highlights the ongoing threat from Chinese cyber activities targeting U.S. systems.
2. Breaches
2.1. U.S. Department of Defense (DoD) Cyber Incidents
The DoD has experienced over 12,000 cyber incidents since 2015, affecting various systems and networks. Despite efforts to reduce these incidents, challenges remain in reporting and managing cyber events. A Government Accountability Office (GAO) report emphasizes the need for enhanced attention to ensure cyber incidents are appropriately reported and shared within the DoD.
2.2. Election Infrastructure Security
As the U.S. presidential election approaches, election infrastructure faces increased cyber threats. Hackers are employing tactics such as phishing, ransomware, and distributed denial-of-service attacks targeting election-related websites and officials. The Cybersecurity and Infrastructure Security Agency (CISA) assures that election infrastructure remains highly secure, with 98% of votes cast using paper ballots and numerous safeguards in place.
3. Ransomware Threats
3.1. Critical Infrastructure Targeting
Ransomware continues to pose a significant threat to U.S. critical infrastructure. In 2022, the FBI reported that 870 critical infrastructure organizations were victims of ransomware, affecting 14 of the 16 critical infrastructure sectors. Among those incidents, almost half were from four sectors: critical manufacturing, energy, healthcare and public health, and transportation systems.
3.2. Election-Related Ransomware Concerns
The upcoming presidential election is considered a prime target for cybercriminal activity, with potential attacks such as ransomware, website disruption, and software exploitation. Authorities note that such attacks have occurred during this election cycle and are likely to continue post-Election Day. Despite the high risk of disruptions, actual voting machines are secure since they are not connected to the internet, and most areas use paper ballots for added security.
4. Mitigation and Response Efforts
4.1. Federal Initiatives
The Biden administration has intensified efforts to protect U.S. critical infrastructure. The National Security Memorandum (NSM) directs the Department of Homeland Security’s Cybersecurity & Infrastructure Security Agency (CISA) and the Department of Commerce’s National Institute of Standards and Technology (NIST) to develop cybersecurity performance goals for critical infrastructure. Additionally, the President’s Industrial Control System Cybersecurity (ICS) Initiative facilitates the deployment of technologies that provide threat visibility, indicators, detections, and warnings.
4.2. International Collaboration
U.S. agencies, including CISA, NSA, and FBI, in collaboration with international partners, have released joint cybersecurity advisories detailing top routinely exploited vulnerabilities. These advisories aim to assist organizations in understanding and mitigating risks associated with these vulnerabilities.
4.3. Disruption of Malicious Operations
In January 2024, the FBI announced that it had disrupted Volt Typhoon’s operations by undertaking court-authorized operations to remove malware from U.S.-based victim routers and taking steps to prevent reinfection. This action underscores the proactive measures taken to counter state-sponsored cyber threats.
Conclusion
The cybersecurity landscape for U.S. infrastructure, military, and policing agencies remains complex and challenging. State-sponsored actors and cybercriminals continue to evolve their tactics, necessitating ongoing vigilance and adaptive defense strategies. Collaborative efforts between federal agencies, international partners, and private sector entities are crucial in mitigating these threats and safeguarding national security.

