Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

U.S. Seeks to Incentivize Semiconductor Manufacturing Domestically | #cybersecurity | #cyberattack | #hacking | #aihp

Policy and Governance: U.S. Government Restricts AI Chips to China

U.S. government officials have instructed the American technology company NVIDIA to stop exporting products containing the A100 and H100, two high-end processors for artificial intelligence (AI) work, to China (1). The restrictions are intended to mitigate the risk that the processors are possibly used for military purposes (2). They will also affect cloud service providers and large internet companies in China, which are some of the biggest users of these types of processors (1). The Chinese Foreign Ministry responded to the restrictions by accusing the U.S. of a ‘tech blockade’ (2).

The U.S. continues to leverage its unique position as the major technology leader in chip design to maintain its superiority. In 2020, the Trump administration banned suppliers from selling chips using U.S. technology to Huawei without a special license (3). In the same year, Britain announced that Huawei would be stripped of its role in the UK’s 5G network (4), with U.S. pressure playing a major role in the decision (5). U.S. and allies’ sanctions have caused issues elsewhere. In Russia, companies that manufacture military equipment experience bottlenecks when procuring semiconductors, companies have difficulty accessing 5G hardware domestically, and local cloud service providers face challenges in increasing their number of servers (6).

Although the U.S. is a leader in processor design, chip manufacturing expertise has been centralized in the far east, especially in Taiwan. This shift toward production in the far-east has been exacerbated by Intel’s – a U.S. company – recent troubles in shrinking their node size to compete with Taiwan Semiconductor Manufacturing Company (TSMC) (7). The Biden administration passed the U.S. Chips Act on August 9th, 2022 (8) to encourage processor manufacturing on American soil. TSMC completed the construction of its fabrication plant in Arizona, with production expected to start in 2024 (9). The bill and U.S. technology have led South Korean companies Samsung Electronics and SK Hynix to rethink their exposure to China (10).

Globally, countries and trade blocs are realizing the importance of domestic chip manufacturing due to the supply chain vulnerabilities highlighted by the pandemic. On February 8th, 2022, the European Union (EU) adopted the European Chips Acts to encourage investment and partnerships to increase the EU’s chip manufacturing capability (11). The British government (12) and the London stock exchange (LSE) (13) are both lobbying the UK-based chip designer Arm to float on the LSE to keep chip design expertise on British shores.

Malware and Key Infrastructure and Critical Vulnerabilities: Ransomware Groups Continue to Target Government and Critical Infrastructure

Ransomware incidents continue to target government organizations and private companies providing critical infrastructure. Recently, the following organizations have been targeted by a ransomware group:

  • Cuba ransomware targeted the government of Montenegro (14)
  • Quantum ransom targeted the Dominican Republic’s Ministry of Agriculture (15)
  • Unknown ransomware targets a Chilean government agency (16)
  • A French hospital (17) was targeted with ransomware
  • BlackCat targeted Italy’s GSE (Electric Service) (18)

Organizations related to government and critical infrastructure are still major targets for ransomware groups due to the likelihood of payout. This trend has been occurring for the past couple of years; in 2021 ransomware was the number one attack vector on critical infrastructure (19). In 2021, 649 critical organizations belonging to a critical infrastructure sector were victims of a ransomware attack, with 14 out of 16 critical infrastructure sectors falling victim to ransom attacks (20).

New and Noteworthy: Tiktok Denies Breach of User Data

On September 3rd, on the Breach Forums message board, a user with the handle AgainstTheWest claimed to have stolen data from TikTok and WeChat. The user included a link to samples of the data as well as a video of database tables. According to the post, the group collected two billion records from the database and stole the internal backend source code of TikTok. TikTok stated that they investigated these claims and found no evidence of a security breach and the stolen code is “completely unrelated to TikTok’s backend source code” (21).

AgainstTheWest (ATW) is a western European hacktivist group that has allegedly targeted China and Russia since October 2021. They target countries they perceive to be a threat to western society with the aim of leaking sensitive data. ATW stated they plan to target North Korea, Belarus, and Iran in the future. They claim they do not use ransomware, that they will never target the West and they have received requests for data from contacts they believe to be involved with nation-state governments (22).

About EclecticIQ Threat Research

EclecticIQ is a global provider of threat intelligence, hunting, and response technology and services. Headquartered in Amsterdam, the EclecticIQ Threat Research team is made up of experts from Europe and the U.S. with decades of experience in cyber security and intelligence in industry and government.

We would love to hear from you. Please send us your feedback by emailing us at [email protected] or fill in the EclecticIQ Audience Interest Survey to drive our research towards your priority area.

Structured Data

Find the Analyst Prompt and earlier editions in our public TAXII collection for easy use in your security stack.

TAXII v1 Discovery services:

Please refer to our support page for guidance on how to access the feeds.

You might also be interested in:

Network Environment-Focused Conversations Needed in Approaches to Cyber Security

Emotet Downloader Document Uses Regsvr32 for Execution

AI Facial Recognition Used in Ukraine/Russia War Prone to Vulnerabilities



*** This is a Security Bloggers Network syndicated blog from EclecticIQ Blog authored by EclecticIQ Threat Research Team. Read the original post at:

Click Here For The Original Source.



Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish