← Back to Index

Geopolitics / National Security

The US–China Cyberwar

A running conflict fought not with missiles but with malware — infrastructure infiltration, telecom surveillance, intellectual property theft at scale, and pre-positioned logic bombs waiting for the order to detonate.

APT / CYBERCOM / MSS / PLA Unit 61398

Two Doctrines, One Digital Battlefield

The US and China are engaged in what intelligence officials describe as the most sustained and damaging state-on-state cyber conflict in history. It is not declared — there is no formal cyberwar resolution, no legal framework governing its conduct — but it is ongoing, escalating, and increasingly consequential for critical infrastructure on both sides.

The two powers approach cyber operations with fundamentally different doctrines:

United States
Signals intelligence (NSA) and covert offensive action (CYBERCOM)
"Defend Forward" — disrupt adversaries before they reach US networks
Targeted strikes on specific adversary infrastructure during crises
Legal constraint: Title 10 / Title 50 authorities, congressional oversight
Primary focus: espionage, deterrence, election security
People's Republic of China
Ministry of State Security (MSS) + PLA Strategic Support Force
"Pre-positioning" — embed in adversary infrastructure years in advance
Massive-scale intellectual property theft to accelerate economic development
No separation between intelligence, military, and commercial cyber actors
Primary focus: IP theft, long-term infrastructure access, political coercion

China's Major Operations — Documented

VOLT TYPHOON
PRC / MSS-affiliated — Active 2021–Present (publicly confirmed 2023)
Perhaps the most alarming Chinese cyber campaign ever publicly disclosed. Volt Typhoon did not steal data — it pre-positioned for sabotage. FBI and CISA confirmed in 2024 that Volt Typhoon had infiltrated US water utilities, power grids, ports, pipelines, and telecommunications providers across all 50 states. The operation used "living off the land" techniques — hijacking legitimate system administration tools to avoid detection — and established persistent access designed to survive network defenders' discovery attempts. The explicit stated purpose, per CISA: to be able to disrupt critical US infrastructure in the event of a military conflict over Taiwan.
Strategic significance: Not espionage. Pre-positioned sabotage capability. The cyber equivalent of planting explosives in infrastructure before a war begins. FBI Director Christopher Wray called it "the defining threat of our generation."
SALT TYPHOON
PRC / MSS — Active 2022–2024 (confirmed October 2024)
Chinese intelligence penetrated the network infrastructure of at least eight major US telecommunications carriers — including AT&T, Verizon, T-Mobile, and Lumen Technologies. Salt Typhoon accessed the backend systems carriers use to comply with US lawful intercept orders (CALEA systems) — meaning China gained access to the same wiretap infrastructure the US government uses for its own surveillance. Senior US government officials' calls and texts were intercepted. The operation also gave China insight into who US intelligence agencies were monitoring — a counterintelligence windfall.
Strategic significance: Described by Senate Intelligence Committee Chair Mark Warner as "the worst telecom hack in US history." China accessed the US government's own surveillance infrastructure. Duration of access: potentially years before discovery.
OPM BREACH
PRC / MSS (attributed) — 2014–2015
Chinese hackers breached the Office of Personnel Management and exfiltrated the personnel records of 22.1 million current and former federal employees — including SF-86 security clearance application forms, which contain extraordinarily sensitive personal data: foreign contacts, financial history, mental health disclosures, family members, and known vulnerabilities. The OPM database is effectively a comprehensive map of the US intelligence community's human terrain — who they are, who they know, and where they're vulnerable to recruitment or coercion.
Strategic significance: Called "the crown jewels of US counterintelligence" by some analysts. The data has likely been cross-referenced with other stolen datasets to identify CIA officers, undercover agents, and recruitment targets. The full scope of damage may never be known.
MICROSOFT EXCHANGE / HAFNIUM
PRC / MSS-linked (HAFNIUM group) — 2021
MSS-linked hackers exploited four zero-day vulnerabilities in Microsoft Exchange Server, compromising at least 30,000 organizations in the United States — and hundreds of thousands globally — within days of the exploit becoming known. Targets included defense contractors, law firms, infectious disease researchers (during COVID-19), and local government agencies. The speed of exploitation suggested China had prepared infrastructure in advance to maximize the window between exploit discovery and patch deployment.
Strategic significance: One of the broadest single cyber operations in history by victim count. Demonstrated China's willingness to conduct mass-exploitation rather than only targeted precision operations.
PLA UNIT 61398 — "COMMENT CREW"
PLA 3rd Department / Shanghai — 2006–2013 (indicted 2014)
The first publicly named PLA cyber unit, exposed by cybersecurity firm Mandiant in 2013. Unit 61398 systematically targeted 141 companies across 20 industries over seven years, stealing terabytes of intellectual property including aerospace designs, energy infrastructure blueprints, pharmaceutical research, and advanced manufacturing processes. The unit operated from a 12-story building in Pudong, Shanghai, with hundreds of staff working regular business hours — confirming cyber espionage as a state-organized, systematized program, not opportunistic hacking.
Strategic significance: The 2014 DOJ indictment of five named PLA officers was the first criminal indictment of foreign state actors for cyber espionage. China recalled its cyber attaché and suspended a bilateral working group — then resumed operations.

US Operations Against China — Documented

BYZANTINE HADES / NSA TAO CHINA OPS
NSA Tailored Access Operations — 2000s–present (partially revealed via Snowden)
Snowden documents confirmed NSA TAO conducted extensive operations against Chinese targets including Tsinghua University (a major internet exchange node), Pacnet (a major Asia-Pacific fiber operator), and Huawei's internal networks. The Huawei operation — codenamed SHOTGIANT — aimed to exploit Huawei equipment's backdoors to conduct surveillance through the equipment Huawei sold to foreign governments, and to understand Huawei's relationships with the PLA.
Strategic significance: China used Snowden's revelations to justify its own mass surveillance programs domestically and to argue that US accusations of Chinese hacking were hypocritical.
CYBERCOM OPERATIONS — DEFEND FORWARD
US Cyber Command — 2018–Present
Under the 2018 Defend Forward doctrine, CYBERCOM has conducted acknowledged and unacknowledged operations inside Chinese networks to identify pre-positioned malware, map MSS and PLA cyber infrastructure, and develop counter-options. Specific operations remain classified, but officials have confirmed CYBERCOM teams operate "left of launch" — disrupting adversary cyber capabilities before they can be used — in both Chinese and Russian networks.
Strategic significance: Marks a shift from reactive defense to persistent offensive presence in adversary networks — matching China's own pre-positioning doctrine.

Critical Infrastructure: The Pre-War Battlefield

The most alarming dimension of the US-China cyber conflict is the systematic infiltration of critical infrastructure — operations designed not to collect intelligence now, but to enable physical sabotage later.

Threat Actor Infrastructure Targeted Confirmed Access? Purpose
Volt Typhoon (CN) Water utilities, power grid, ports, pipelines, telecom Yes — CISA/FBI confirmed 2024 Pre-positioned sabotage; Taiwan conflict trigger
Salt Typhoon (CN) Major US telecom carriers (AT&T, Verizon, T-Mobile) Yes — confirmed Oct 2024 Surveillance of officials; access to US wiretap systems
MSS / PLA (CN) Defense industrial base, universities, labs Yes — multiple DOJ indictments IP theft; military technology transfer
NSA / CYBERCOM (US) Chinese telecom (Huawei), military networks Partially — Snowden docs Intelligence collection; counter-option development
CISA Emergency Advisory — 2024
Following Volt Typhoon confirmation, CISA issued guidance stating Chinese actors had achieved "persistent access" to "multiple" critical infrastructure sectors and that network defenders should assume compromise. The advisory noted the activity was "not focused on espionage" but on pre-positioning for "potential future disruptive or destructive cyberattacks."

Key Events Timeline

2006–2013 — CHINA
PLA Unit 61398 — systematic IP theft
141 companies across 20 industries. Aerospace, energy, pharma, manufacturing. Terabytes exfiltrated from Shanghai government building.
2010 — US + ISRAEL
Stuxnet destroys Iranian centrifuges
First cyberweapon to cause physical destruction. Demonstrates US willingness to use offensive cyber for kinetic effects. China takes extensive notes.
2014–2015 — CHINA
OPM breach — 22.1M records stolen
Crown jewels of US intelligence community HR data. SF-86 files, fingerprints, foreign contacts. Counterintelligence damage still unfolding.
2015 — OBAMA–XI SUMMIT
Xi pledges to stop commercial cyber theft
Temporary reduction in Chinese IP theft operations. Formal "cyber norms" agreement. Operations resume at scale within two years as MSS replaces PLA as primary cyber actor.
2021 — CHINA
HAFNIUM — 30,000+ Exchange servers compromised
Mass exploitation of Microsoft Exchange zero-days. Speed of compromise suggests pre-staged infrastructure. Defense contractors, law firms, health researchers targeted.
2021–2023 — US
CYBERCOM Hunt Forward missions expand
US teams deployed to Ukraine, Baltic states, and Asia-Pacific partners to hunt adversary malware on allied networks. China named as primary threat in classified mission briefs.
2021–2024 — CHINA
Volt Typhoon infiltrates US critical infrastructure
Water, power, ports, pipelines — all 50 states. Pre-positioned sabotage capability. Designed to activate in event of Taiwan military conflict. "Living off the land" evasion.
2022–2024 — CHINA
Salt Typhoon penetrates US telecom backbone
AT&T, Verizon, T-Mobile, Lumen compromised. Access to CALEA lawful intercept systems. Senior government officials' communications intercepted. Worst telecom hack in US history.
2025–Present
Escalating posture on both sides
CYBERCOM budget increases. China expands MSS cyber units. Taiwan Strait tensions drive both sides toward more aggressive pre-positioning and counter-positioning operations.

Where This Is Going

Several trends define the near-term trajectory of the US-China cyber conflict:

"China has burrowed into our critical infrastructure. They're not stealing data now — they're waiting. They're pre-positioning for the day they decide to pull the trigger."

— FBI Director Christopher Wray, testimony before the House Select Committee on the Chinese Communist Party, January 2024
The Deterrence Gap
The US has never publicly acknowledged conducting offensive cyber operations against Chinese critical infrastructure, though it almost certainly has done so. This asymmetric disclosure creates a deterrence gap: China's cyber aggression is publicly documented and condemned, but the US cannot credibly threaten equivalent retaliation without acknowledging capabilities and operations it prefers to keep covert. This gap emboldens continued Chinese operations below the threshold that would trigger a declared US response.

Primary Sources & Further Reading