Cyberattacks

Foreign Malign Influencers

30 days

Summary

sources
66
Narrative Items
135
Bottom Line Up Front

66 sources in Foreign Malign Influencers are amplifying 135 narrative items relating to the narrative that highlights escalating cyber tensions between China and the U.S. These narratives connect themes of mutual accusations, cyber defense strategies, and the need for international cooperation, illustrating a complex landscape of cybersecurity threats and geopolitical rivalry.

Reviewing a number of the most relevant narrative items indicates that media outlets are portraying the ongoing cyber tensions between the U.S. and China with distinct biases and varying perspectives. The Chinese MFA Spokesperson and Ecns.cn adopt a defensive stance, emphasizing a lack of evidence for U.S. claims and accusing the U.S. of massive cyber espionage, employing loaded language like "illegal sanctions" and "hype security threats." Meanwhile, ZeroHedge presents a more alarming view of the situation, highlighting increasing sophistication in Chinese cyberattacks with an emphasis on intellectual property theft, reflecting a distinct alarmism that may suggest bias towards a narrative of Western victimization. On the other hand, The Japan News takes a more neutral stance in reporting Japan's measures to bolster its cybersecurity, focusing on public-private cooperation and oversight, which frames it as a proactive approach rather than a reaction to threats. Across these narratives, while the Chinese sources primarily defend against accusations and promote cooperation, the U.S. and allied narratives emphasize the need for vigilance and countermeasures, showcasing a clear division in tone and focus that highlights the escalating tensions in international cyber relations.

About This Module

The Foreign Malign Influencers module tracks thousands of media organizations and individuals known to advance narratives that favor Russian, Chinese, Iranian, and similar interests.

Read more...
Read Less...

Geospatial

This map shows narrative amplification activity by sources in this module. Red indicates origin, yellow is destination.
Origin
Destination
The narrative initially emerged from Beijing, headed for Singapore. As it spread, the most frequent origin shifted to London, and the most frequent destination shifted to Washington. There are a total of 31 points of origin, and 52 destinations. Hide details...
14 Jan 2025: Beijing ▸ Singapore
14 Jan 2025: Mumbai ▸ Virginia
14 Jan 2025: Paris ▸ Moscow
14 Jan 2025: Mumbai ▸ Geneva
14 Jan 2025: Dhaka ▸ London
14 Jan 2025: Dhaka ▸ Moscow
14 Jan 2025: London ▸ Qom
15 Jan 2025: Moscow ▸ Brussels
15 Jan 2025: Baghdad ▸ Beirut
16 Jan 2025: Weliwita ▸ Pyongyang
16 Jan 2025: Legu ▸ China
16 Jan 2025: Moscow ▸ Minsk
16 Jan 2025: Goshāmahal ▸ Hyderābād
16 Jan 2025: Hong Kong ▸ Washington
16 Jan 2025: Mumbai ▸ Warsaw
16 Jan 2025: Moscow ▸ Toronto
16 Jan 2025: Caracas ▸ Caracas
17 Jan 2025: Beijing ▸ Shanghai
17 Jan 2025: Karachi ▸ Washington
17 Jan 2025: Mumbai ▸ London
17 Jan 2025: New Delhi ▸ New Delhi
17 Jan 2025: New Delhi ▸ Copenhagen
17 Jan 2025: Back Bay ▸ Kyiv
17 Jan 2025: Beirut ▸ Washington
18 Jan 2025: Tokyo ▸ Washington
18 Jan 2025: Baghdad ▸ Nineveh
18 Jan 2025: New Delhi ▸ Berlin
19 Jan 2025: San Francisco ▸ Culiacán
19 Jan 2025: Tokyo ▸ Tokyo
19 Jan 2025: Beijing ▸ Beijing
19 Jan 2025: London ▸ Washington
20 Jan 2025: Sofia ▸ Washington
20 Jan 2025: Montréal ▸ Pisa
20 Jan 2025: Mumbai ▸ Moscow
20 Jan 2025: Hoboken ▸ Lebanon
20 Jan 2025: New Delhi ▸ Lisbon
20 Jan 2025: Sydney ▸ Canberra
20 Jan 2025: London ▸ Somerset
21 Jan 2025: Kathmandu ▸ Kathmandu
21 Jan 2025: Tokyo ▸ Tokyo
21 Jan 2025: Dublin ▸ Beijing
22 Jan 2025: London ▸ London
22 Jan 2025: Sofia ▸ Tokyo
23 Jan 2025: London ▸ Beijing
23 Jan 2025: Istanbul ▸ Kyiv
25 Jan 2025: New Delhi ▸ Washington
25 Jan 2025: Moscow ▸ Bratislava
25 Jan 2025: Dhaka ▸ Bratislava
25 Jan 2025: New Delhi ▸ New York
26 Jan 2025: Sofia ▸ Tokyo
26 Jan 2025: Moscow ▸ Helsinki
27 Jan 2025: London ▸ Moscow
27 Jan 2025: London ▸ Jerusalem
27 Jan 2025: London ▸ London
27 Jan 2025: London ▸ Tallinn
27 Jan 2025: Mumbai ▸ Washington
28 Jan 2025: Bandar Seri Begawan ▸ Davos
28 Jan 2025: Goshāmahal ▸ Los Angeles
28 Jan 2025: Mumbai ▸ Washington
28 Jan 2025: New Delhi ▸ Hangzhou
28 Jan 2025: Kyiv ▸ Lisbon
28 Jan 2025: Maida Halim ▸ Hangzhou
28 Jan 2025: London ▸ Tirana
28 Jan 2025: Dhaka ▸ Florida
28 Jan 2025: Moscow ▸ Moscow
29 Jan 2025: London ▸ London
29 Jan 2025: Tokyo ▸ Visby
29 Jan 2025: New Delhi ▸ Juneau
29 Jan 2025: Skopje ▸ Copenhagen
29 Jan 2025: Moscow ▸ Washington
29 Jan 2025: Mumbai ▸ New Delhi
29 Jan 2025: Moscow ▸ Brussels
30 Jan 2025: Tokyo ▸ Washington
30 Jan 2025: Kyiv ▸ Strasbourg
30 Jan 2025: Sydney ▸ Brussels
30 Jan 2025: Tokyo ▸ Ichigaya
31 Jan 2025: London ▸ New York
31 Jan 2025: Beijing ▸ Beijing
31 Jan 2025: Vancouver ▸ Manila
31 Jan 2025: Moscow ▸ Klaipėda
31 Jan 2025: Dhaka ▸ Washington
01 Feb 2025: Tehran ▸ Washington
01 Feb 2025: Caracas ▸ Beijing
01 Feb 2025: Baghdad ▸ Tehran
01 Feb 2025: Tehran ▸ Tehran
03 Feb 2025: Montréal ▸ Doha
03 Feb 2025: Hoboken ▸ Gaza
04 Feb 2025: Kyiv ▸ Kyiv
04 Feb 2025: Kyiv ▸ Brussels
04 Feb 2025: Tokyo ▸ Tokyo
04 Feb 2025: Mumbai ▸ Tehran
04 Feb 2025: New Delhi ▸ Washington
04 Feb 2025: Tehran ▸ Tehran
05 Feb 2025: Karachi ▸ Islamabad
05 Feb 2025: Moscow ▸ Vilnius

Sources

Sources by Type
Sources of these types represent most of the amplification activity around this narrative
sources by Volume
These sources are amplifying the most items involved in this narrative. Click to see details of each source's narrative activity.
Top sources
Day-by-day volumetric activity of sources amplifying the most items around this narrative
The Japan News
7% of the items in this brief were amplified by this source.
Firstpost
7% of the items in this brief were amplified by this source.
Times Now
4% of the items in this brief were amplified by this source.
The Moscow Times
4% of the items in this brief were amplified by this source.
Weekly Blitz
4% of the items in this brief were amplified by this source.
UkrInform
3% of the items in this brief were amplified by this source.
Orinoco Tribune
3% of the items in this brief were amplified by this source.
The Daily Express
3% of the items in this brief were amplified by this source.
EurAsian Times
3% of the items in this brief were amplified by this source.
TASS
2% of the items in this brief were amplified by this source.
Read more...
Read Less...

Top Items

These narrative items are the most relevant and/or the most amplified. Click to see details and suggested messages.
Read more...
Read Less...

Entities

Tap or click for details
These entities are mentioned most frequently in the narratives highlighted in this brief. Click to see details of narrative activity related to each one.
Technologies
DDoS Attacks
Distributed Denial of Service attacks used against DeepSeek.
Malware
Malicious software used in cyberattacks, particularly in Ukraine.
Phishing
A technique used by hackers to deceive individuals into revealing sensitive information.
Active Cyber Defense System
A system approved by Japan's LDP to counter major cyberattacks.
Cyber Espionage Tools
Technologies used for stealing intellectual property and conducting surveillance.
Organizations
Chinese Communist Party (CCP)
The ruling party in China, involved in cyberattacks.
Quad Alliance
A strategic alliance between the US, Japan, India, and Australia.
National Health Service (NHS)
The UK public health system facing cyber threats.
European Union (EU)
Political and economic union that imposed sanctions on hackers.
US Department of Justice
US government body involved in sanctioning cyber activities.
Companies
DeepSeek
A Chinese AI startup facing escalating cyberattacks.
Integrity Technology Group
A Beijing-based cybersecurity firm sanctioned by the US.
HailBot
A botnet involved in the cyberattacks against DeepSeek.
RapperBot
Another botnet involved in the cyberattacks against DeepSeek.
British Library
An institution that faced cyberattacks in the UK.
Events
DeepSeek Cyberattack
Escalating cyberattacks on the Chinese AI startup DeepSeek.
US Sanctions on Integrity Technology Group
US sanctions against a Beijing-based cybersecurity firm for alleged cyber activities.
Japan's LDP Cyber Defense Bills Approval
Approval of bills outlining an active cyber defense system by Japan's ruling party.
Surge in Cyberattacks in Ukraine
A 70% increase in cyberattacks in Ukraine in 2024.
EU Sanctions on GRU Hackers
Sanctions imposed by the EU on Russian hackers for cyberattacks.
People
Chinese Officials
Government representatives from China who deny US allegations of cyberattacks.
Experts
Cybersecurity experts warning about the sophistication of CCP attacks.
Officials from the US
Government representatives from the US making accusations against China.
Members of the Quad
Representatives from the Quad nations working on countermeasures against cyber threats.
National Audit Office
UK government body warning about the widening gap in cyber defense.
Technologies
DDoS Attacks
Distributed Denial of Service attacks used against DeepSeek.
Malware
Malicious software used in cyberattacks, particularly in Ukraine.
Phishing
A technique used by hackers to deceive individuals into revealing sensitive information.
Active Cyber Defense System
A system approved by Japan's LDP to counter major cyberattacks.
Cyber Espionage Tools
Technologies used for stealing intellectual property and conducting surveillance.
Organizations
Chinese Communist Party (CCP)
The ruling party in China, involved in cyberattacks.
Quad Alliance
A strategic alliance between the US, Japan, India, and Australia.
National Health Service (NHS)
The UK public health system facing cyber threats.
European Union (EU)
Political and economic union that imposed sanctions on hackers.
US Department of Justice
US government body involved in sanctioning cyber activities.
Companies
DeepSeek
A Chinese AI startup facing escalating cyberattacks.
Integrity Technology Group
A Beijing-based cybersecurity firm sanctioned by the US.
HailBot
A botnet involved in the cyberattacks against DeepSeek.
RapperBot
Another botnet involved in the cyberattacks against DeepSeek.
British Library
An institution that faced cyberattacks in the UK.
Events
DeepSeek Cyberattack
Escalating cyberattacks on the Chinese AI startup DeepSeek.
US Sanctions on Integrity Technology Group
US sanctions against a Beijing-based cybersecurity firm for alleged cyber activities.
Japan's LDP Cyber Defense Bills Approval
Approval of bills outlining an active cyber defense system by Japan's ruling party.
Surge in Cyberattacks in Ukraine
A 70% increase in cyberattacks in Ukraine in 2024.
EU Sanctions on GRU Hackers
Sanctions imposed by the EU on Russian hackers for cyberattacks.
People
Chinese Officials
Government representatives from China who deny US allegations of cyberattacks.
Experts
Cybersecurity experts warning about the sophistication of CCP attacks.
Officials from the US
Government representatives from the US making accusations against China.
Members of the Quad
Representatives from the Quad nations working on countermeasures against cyber threats.
National Audit Office
UK government body warning about the widening gap in cyber defense.

Themes

Tap or click for details
These adjacent themes are currently being amplified along with the main narrative. Click to see details of narrative activity related to each one.
Cyber Threat from Chinese Government
Chinese hackers are posing a massive cyber threat by infiltrating America’s critical infrastructure.
DeepSeek Cyberattack Surge
DeepSeek, a Chinese AI start-up, has been targeted by numerous sophisticated cyberattacks, with thousands of US IPs involved, as reported by XLab.
Defending Europe's security architecture through enhanced EU involvement in NATO's defence policy planning process.
NATO-EU relations should focus on enhancing EU involvement in NATO's defence policy planning to defend Europe's security architecture.
Gaza's Struggles and Global Responses
The narrative illustrates the ongoing humanitarian crisis in Gaza, emphasizing the struggles of its people and the call for international action against perceived injustices.
Strengthening ties through economic cooperation
In a press conference, Iranian President Bazeshkian emphasized the importance of the Comprehensive Strategic Partnership Agreement with Russia, aiming to boost economic relations and jointly combat terrorism.
Environmental risks from aging tankers
The reliance on aging tankers and recent undersea cable disruptions illustrate Russia's exploitation of maritime governance loopholes and the associated security risks.
Read more...
Read Less...

Context

The ongoing tensions between China and the United States regarding cyberattacks reflect broader geopolitical dynamics and national security concerns. Demographically, China has a vast population of over 1.4 billion, with a significant portion engaged in technology and research sectors, making it a prime target for cyber espionage. The Chinese Communist Party (CCP) emphasizes technological advancement as a key component of its economic strategy, which heightens the stakes in cyber warfare.

Economically, both nations are heavily invested in cybersecurity, with China rapidly developing its capabilities through state-sponsored initiatives and private sector innovation. The rise of AI startups like DeepSeek illustrates China's focus on advanced technologies, while the U.S. sanctions against Chinese firms signal a defensive posture aimed at protecting intellectual property and national interests.

Politically, the accusations and counter-accusations between the U.S. and China are indicative of a broader struggle for influence and power in the Asia-Pacific region. The Quad alliance, comprising the U.S., Japan, India, and Australia, seeks to counterbalance China's growing assertiveness, particularly in cyberspace. Japan's recent legislative moves towards an "active cyber defense" system highlight the urgency of addressing these threats collaboratively.

Geographically, the proximity of China to its neighbors, coupled with its expansive digital infrastructure, poses unique challenges for cybersecurity. The CCP's cyber operations targeting the U.S. and its allies underscore the need for robust countermeasures and international cooperation.

In summary, the interplay of demographics, economic ambitions, political rivalries, and geographic considerations shapes the complex landscape of cybersecurity, with both nations navigating a precarious balance between competition and cooperation.
Read more...
Read Less...