Updated
Updated · The New York Times · May 11
China Hackers Target Hundreds of US Utilities, Stealing Up to $600 Billion in IP Annually
Updated
Updated · The New York Times · May 11

China Hackers Target Hundreds of US Utilities, Stealing Up to $600 Billion in IP Annually

3 articles · Updated · The New York Times · May 11
  • Hundreds of local U.S. utility systems were seeded with malware by China-linked Volt Typhoon, positioning Beijing to disrupt water and electricity supplies, according to the opinion article.
  • Salt Typhoon also penetrated telecommunications networks nationwide, tapping senior U.S. officials’ phones and systems serving millions of Americans.
  • China-sponsored cyber actors steal an estimated $225 billion to $600 billion in U.S. intellectual property each year, underscoring that the campaign spans infrastructure, telecoms and corporate networks.
  • The article argues the U.S. should press Xi Jinping at this week’s summit but, more urgently, move beyond voluntary information sharing by enlisting tech firms, rewriting laws and helping states and cities patch vulnerabilities.
As new laws force tech out of US networks, will this security push trigger a wider US-China economic conflict?
Can a new US-industry partnership truly defend against millions of compromised smart devices now aimed at critical infrastructure?
With AI now a weapon in cyber warfare, is the US losing its technological edge to China's industrial-scale espionage?

Chinese Cyber Infiltration of US Critical Infrastructure: 2026 Threat Assessment, Tactics, and National Security Response

Overview

As of 2026, the United States faces a critical threat from sophisticated Chinese-speaking cyber actors who methodically infiltrate and maintain deep access to US critical infrastructure. These adversaries exploit vulnerabilities in industrial edge devices, using groups like Kamacite for reconnaissance and initial access, then deploy persistent malware such as Voltzite to embed themselves within utilities. By compromising key components and exfiltrating sensitive data, including product-related DLLs, they raise severe risks of supply-chain attacks and disruption of essential services. This evolving threat demands immediate action to implement robust security standards and safeguard national security and daily life.

...