Media specializing in cybersecurity at a global level, such as the portal, Mandiant, assured that since September 2022, the United States has been under siege by a pro-Chinese communist group that exercises cyber-terrorism.

“Dragon Bridge, is the multinational criminal group in charge of sabotaging the legislative elections to the U.S. Congress this November 8, 2022,” Mandiant said. “They published a video in English on various internet platforms, where they claim to be able to boycott the American elections,” explained the cybersecurity agency.

Cyberterrorism is focused on: “Questioning the legitimacy and effectiveness of voting in the United States,” added Mandiant. And at this point, it is imperative to say that the U.S. electoral system has been under attack for some time.

Review of the legislative elections in the United States

This November 8, 2022, mid-term or legislative elections will be held in the United States, with 34 of the 100 seats contested in the Senate for a six-year term in the U.S. Congress. The U.S. Senate currently has 50 Republicans and 50 Democrats, and two independents,

These elections are supported by two special elections in California, related to the term of Kamala Harris, and in Oklahoma, the four-year term of Jim Inhofe.

Six Republican senators and one Democratic senator have announced that they will not run for re-election. Leaving 15 Republicans and 13 Democrats running for a second term.

The winners of these elections will serve in the 118th U.S. Congress. As of January 2021, Democrats are in the majority, with an effective average of 51 seats in the House with the tie-breaking vote held by Vice-President Kamala Harris.

A hate campaign designed for the average American voter

The campaign promoted by the Chinese hackers has a subtle media cover. The hackers appear as heroes in front of the average voter in the U.S. in reality, and they are trying to make citizens see them as saviors.

Mandiant said that the pirates assume that: “The solution is not to vote, but to eradicate this inefficient and incompetent system,” alluding to the American electoral system.

References to the climate of hatred, in alignment with the culture of the American elites, are pushed by communist theory. Allegories of the civil war in the United States, as a symbol of state division, are part of this campaign that tries to demonstrate a climate of political deterioration in the country.

The FBI has identified several pro-communist groups that sabotage the American public relations system, including the APT 41 group, which also goes by Barium. It responds to Chinese interests.

Barium, according to Mandiant, combines cyber espionage within the medical, defense, media, and automotive industries.

Dragon Bridge hacked a Radio Free Asia account and blamed it on “American hackers.”

Along the same lines as Mandiant, the cybersecurity firm Record Future revealed that the Chinese Communist Party is the architect of the malicious campaign on U.S. networks, blaming “American hackers.”

The objective is to divide voters to make it look like an election typical of states with low-quality institutions, exposing the electoral system in front of the country’s citizens.

The NSA of the United States identifies cyber attacks against sensitive sites

In a report to the U.S. government, the cybersecurity firm Palo Alto Networks said that around 600 cases in the U.S. where systems are running a vulnerable type of software, which hackers have exploited.

It claims the number of hacked infrastructures is five and growing, where hackers steal passwords intending to intercept sensitive information.

Palo Alto Networks Unit 42 believes hackers are attempting to siphon critical data from some U.S. companies, particularly in the defense sector.

This adversary has aggressively targeted organizations in the U.S., mainly in the defense and technology industries, Ryan Olson, vice president of Palo Alto’s Division 42, told CNN.

He added: “While we are learning more about the impact of these attacks, we urge organizations to quickly patch vulnerable systems and follow the recommendations to find out if their data has been compromised,” Olson said.

Sign up to receive our latest news!

By submitting this form, I agree to the terms.