Cyber actors linked to the People鈥檚 Republic of China are targeting router firmware in government and multinational organizations, which should review all subsidiary connections and consider implementing Zero Trust models to limit a potential compromise, U.S. and Japanese agencies advised Sept. 27. 
 
鈥淎s geopolitical tensions between the U.S. and China increase, we can expect to see a corresponding increase in sophisticated supply chain attacks by the PRC,鈥 said John Riggi, AHA鈥檚 national advisor for cybersecurity and risk. 鈥淎lthough these attacks do not appear to be targeting health care specifically, if these compromised routers are present within our networks, we are equally exposed to the vulnerability. Among the many remediation techniques described in the alert, it is critical to block unauthorized outbound connections, white-list authorized IP addresses and monitor logs for anomalous behavior.鈥
 
For more information on this or other cyber and risk issues, contact Riggi at鈥. For the latest cyber and risk resources and threat intelligence, visit鈥aha.org/cybersecurity

Related News Articles

Headline
The FBI, Cybersecurity and Infrastructure Security Agency and Australian Cyber Security Centre June 4 released an advisory on updated actions and tactics used鈥
Headline
The National Security Agency, Cybersecurity and Infrastructure Security Agency and international partners May 22 released guidance on securing data used for鈥
Headline
The FBI, along with the National Security Agency and other international cybersecurity agencies, this week released a joint agency advisory on cyber operations鈥
Headline
The FBI's Internet Crime Complaint Center released an alert May 7 warning of cyber actors exploiting vulnerabilities in end-of-life routers. Routers dated 2010鈥
Headline
The FBI鈥檚 Internet Criminal Complaint Center May 15 released an alert warning of a malicious text and voice messaging campaign involving impersonators鈥
Headline
In his latest AHA Cyber Intel blog, John Riggi, AHA national advisor for cybersecurity and risk, examines the state of cyber and physical threats in 2025 as鈥