top of page

People’s Republic of China (PRC) State-Sponsored Cyber Actors Exploit Network Providers and Devices

This joint Cybersecurity Advisory describes the ways in which People’s Republic of China (PRC) state-sponsored cyber actors continue to exploit publicly known vulnerabilities in order to establish a broad network of compromised infrastructure.


These actors use the network to exploit a wide variety of targets worldwide, including public and private sector organizations.


PRC state-sponsored cyber actors readily exploit vulnerabilities to compromise unpatched network devices. Network devices, such as Small Office/Home Office (SOHO) routers and Network Attached Storage (NAS) devices, serve as additional access points to route command and control (C2) traffic and act as midpoints to conduct network intrusions on other entities.


Best Practices:

• Apply patches as soon as possible

• Disable unnecessary ports and protocols

• Replace end-of-life infrastructure

• Implement a centralized patch management system


Contact us today to discuss your cybersecurity. We may be reached at:

412-551-0361 (phone or text)

1 view0 comments

Recent Posts

See All

Comp Solutions, LLC launches new website

Comp Solutions, LLC launches new website: www.compsolutionsllc.net Please check us out. 412-551-0361 (phone or text) Ken@CompSolutionsLLC.net https://www.compsolutionsllc.net/support-computer-rep

What is cloud computing and can it help your business?

Cloud computing is a term referred to storing and accessing data over the internet. It does not store any data on the hard disk of your personal computer. You access data on a remote server. Advanta

bottom of page