Robinson & Cole LLP (LexBlog China)

26 results for Robinson & Cole LLP (LexBlog China)

  • Dragos Outlines Voltzite’s Attacks Against Critical Infrastructure

    In a joint release last week, the Cybersecurity and Infrastructure Security Agency (CISA) and other federal agencies issued a chilling Advisory about the ongoing attacks by Volt Typhoon on U.S. critical infrastructure. Volt Typhoon is a People’s Republic of China (PRC) sponsored group that uses slow and persistent techniques to gain entry into U.S.-based critical...

  • CISA and FBI Issue Cybersecurity Guidance for the Use of Chinese-Manufactured Drones

    Last week, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released Cybersecurity Guidance: Chinese-Manufactured Unmanned Aircraft Systems (UAS), which outlines the risks and threats posed by Chinese-manufactured unmanned aerial systems (UAS or drones) and provides cybersecurity safeguards to reduce these risks to networks and sensitive...

  • Chinese Hackers Allegedly Use ChatGPT to Write Ransomware

    Chinese authorities have arrested alleged hackers in what appears to be the first-ever reported case of hackers using AI to develop ransomware. These alleged hackers reportedly used ChatGPT to refine the code for their home-grown ransomware encryption tool. ChatGPT has been banned in China in favor of Chinese tools such as Baidu’s Ernie Bot. However,...

  • Lawmakers Seek Ban of Chinese Drones for U.S. Government

    Next week, the House of Representatives China Committee plans to introduce a bill that would ban the purchase of Chinese-made drones by the U.S. government. This bill is an effort to revamp the prior push for this ban that was derailed by lobbying efforts. The American Security Drone Act, as it is coined, would not...

  • Privacy Tip #377 – China’s Threat to US: Watch 60 Minutes with the Five Eyes

    If you didn’t get to watch “60 Minutes” on Sunday and see the “Five Eyes” warn us all about China, put it on your list to watch soon. The Five Eyes are the intelligence leaders of five allied countries: U.S., Canada, U.K., Australia, and New Zealand. I have never seen all five together before and...

  • High Alert: China Linked BlackTech Hides in Router Firmware

    Not only is the People’s Republic of China (PRC) a threat with its use of TikTok, but it also supports threat actors that have for years attacked U.S. based companies as well as the governments of the U.S. and Japan. According to a Joint Advisory published on September 27, 2023, by the National Security Agency,...

  • Growing Calls to Ban Chinese Owned TikTok App and Other Software Apps Considered to be National Security Threats

    Chinese company ByteDance faces growing concerns from governments and regulators that user data from its popular short video-sharing app TikTok could be handed over to the Chinese government. The concern is based on China’s national security laws, which give its government the power to compel Chinese-based companies to hand over any user data. More than 100...

  • Chip Manufacturer ARM Won’t Sell its Latest Designs in China Due to Export Controls

    Chip manufacturer ARM reportedly won’t sell its latest Neoverse V series computer chips to Chinese tech giant Alibaba due to concerns over U.S. and UK export controls on certain classes of powerful chipsets. Among the most advanced chips on the market, sale of the Neoverse V chips would likely violate trade restrictions intended to keep...

  • FCC Bans Import of Chinese Technology

    The Federal Communications Commission (FCC) will categorically ban devices over national security concerns for the first time in history. Per a new order, the FCC will prohibit the import and sale of devices produced by Huawei and ZTE, and restrict the use of several other Chinese-produced devices for government and critical infrastructure purposes. Huawei and...

  • China’s Semiconductor and Advanced Computing Industries Targeted by New Department of Commerce Export Restrictions

    This week we are pleased to have a guest post from Edward Heath and Kevin Daly.  Attorneys Heath and Daly are members of Robinson+Cole’s Manufacturing Industry Team and regularly counsel clients on trade compliance, anti-corruption compliance, and other corporate compliance issues. On October 7, 2022, the U.S. Department of Commerce announced a series of new export controls designed to curtail...

  • CISA Lists Top CVEs Exploited by Chinese State-Sponsored Cyber Actors

    The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an Alert outlining the top Common Vulnerabilities and Exposures (CVEs) that have been used by the People’s Republic of China (PRC) state-sponsored cyber actors since 2020. According to the Alert, these threat actors “continue to exploit known vulnerabilities to actively target U.S. and allied networks as...

  • China Launches First Crewless Drone Carrier

    Last week, China announced its launching of the world’s first crewless drone carrier, which operates using artificial intelligence to navigate open water autonomously. The Chinese government has said that this vessel will be used as a maritime research tool, but many skeptics suggest that it could also be used as a military vessel. The vessel...

  • Joint Advisory Warns of Chinese-Sponsored Attacks on Telecommunications Companies

    A joint advisory issued June 7, 2022, by the Cybersecurity & Infrastructure Security Agency, FBI and the National Security Agency entitled “People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices,” warns that Chinese-Sponsored cyber actors are exploiting “publicly known vulnerabilities in order to establish a broad network of compromised infrastructure.” The...

  • China-Based Ransomware Operator Exploiting Log4j Vulnerability

    Microsoft has issued frequent updates on the Log4j vulnerability that we have been hearing so much about. The vulnerability is a serious problem that will become more widespread as time goes on. According to Microsoft’s threat intelligence team: “The Log4j vulnerabilities represent a complex and high-risk situation for companies across the globe. This open-source component...

  • U.S. Organizations Doing Business in China Warned of Malware in Tax Software

    The Federal Bureau of Investigations (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint Flash Alert to U.S. based businesses doing business in China about a remote targeting campaign whereby the tax software that Chinese domestic banks require foreign companies to install is loaded with malware. Trustwave researchers warned in June...

  • Privacy Tip #247 – TikTok in Multiple Cross Hairs

    I have never been a fan of TikTok [view related post]. In general, I do not trust any Chinese technology companies because of the influence and requirements the Chinese government wields over them. The Chinese government has been stealing U.S.-based companies’ intellectual property for decades, has required U.S.-based companies to provide computer code in order...

  • DJI Responds to Recent Cybersecurity Report on App Vulnerabilities

    This week, China-based DJI, the drone industry’s leading manufacturer of drones, issued a public statement regarding the recent reports released by cybersecurity researchers (neither Synacktiv nor GRIMM) about the security of its drones’ control app. In two reports, the researchers claimed that an app on Google’s Android operating system that powers DJI drones collects large...

  • Antwork Uses Drones in China to Assist in Transport During Coronavirus Outbreak

    Last week, a medical delivery drone flying from the People’s Hospital of Xinchang County to the disease control center there successfully completed the air transport of needed medical quarantine supplies and patient samples in the coronavirus outbreak. This is the first launch of Antwork’s “urban air transportation channel” to help fight the coronavirus outbreak in...

  • Cyber Criminals Using Coronavirus Concern to Assist with Intrusions

    Concern over the spreading coronavirus from China is legitimate and real. The World Health Organization (WHO) has declared the coronavirus a global health emergency, and the United States and other countries are limiting travel of individuals from the affected areas in China. As we have seen with other public concerns, cyber criminals and threat actors...

  • Hackers Indicted for Involvement in 2015 Anthem Data Breach

    Earlier this month, a federal grand jury returned an indictment charging a Chinese national and another individual as part of an extremely sophisticated hacking group operating in China that targeted large businesses in the United States, including health insurer Anthem. The indictment stemmed from an investigation by the FBI in which Anthem cooperated, earning praise...

  • China-Based Company is Believed to be Behind HiddenWasp Malware

    Vicious malware continues to be deployed by China-based attackers. A new strain of malware, dubbed “HiddenWasp,” which has the ability to remotely infect computers, has been discovered by a security researcher at Intezar. The malware is believed to have originated from a Chinese forensics firm; the malware is hosted by servers owned by a Hong...

  • Doing Business in China: Risks for Manufacturers

    One of the blogs that we really enjoy is the China Law Blog, which is written primarily by Dan Harris of Harris Bricken.  Dan recently wrote a post about the pitfalls of relying on a representation by a non-Chinese company that they own a manufacturing facility in China. As Dan states directly: Here’s the deal....

  • China Agritech, Inc. v. Resh: Class Actions Toll Statutes of Limitations Only for Individual Suits

    Yesterday, in China Agritech, Inc. v. Resh, the U.S. Supreme Court ruled that, under its prior decision in American Pipe & Constr. Co. v. Utah, 414 U.S. 538 (1974), the filing of a putative class action suit tolls the statutes of limitations only to allow individual, non-class suits to be filed after class certification is...

  • Chinese Telecom Companies in Hot Water

    Chinese cyber espionage and cyber-attack capabilities will continue to support China’s national security and economic priorities,” says Dan Coats, the Director of National Intelligence “Americans should not buy Huawei or ZTE products.” In March 2017 the Chinese Telecom company, ZTE, plead guilty to shipping US technology to Iran and North Korea, and reached a settlement...

  • Connecticut Town Struck by Cyber Fraud

    On January 17, 2017, officials in Farmington, Connecticut disclosed that the town was recently the victim of a multi-million dollar theft likely perpetrated by sophisticated cybercriminals operating in China. The thieves intercepted a $2 million dollar Automated Clearing House (ACH) transfer that was intended as payment to a local company for work on a large...

  • Chinese national hacker pleads guilty to sending U.S. military data to China

    The FBI and DOJ continue their effort to bring cyber hackers to justice. Last week, Chinese national Su Bin pled guilty to stealing data related to Boeing’s C-17 military cargo plane and of trying to steal information related to U.S. F-22 and F-35 fighter jets. Bin was indicted, along with other co-conspirators, in August 2014...

  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT