Tech Souls, Connected.

Why Australia Says Chinese Hackers Are Targeting Its Most Critical Systems

ASIO chief Mike Burgess says China-backed groups like Volt Typhoon are infiltrating essential networks, echoing U.S. fears of widespread disruption.


A Growing Cyber Threat to National Stability

Australia’s top intelligence official has issued a stark warning: China-backed hackers are actively probing—and in some cases penetrating—Australia’s critical infrastructure.

  • Mike Burgess, director-general of the Australian Security Intelligence Organisation (ASIO), revealed that at least two Chinese state-aligned hacking groups are attempting to “pre-position” inside key systems.
  • Their goal: espionage, sabotage, and the ability to disrupt essential services when needed.

Burgess delivered the warning during a conference in Melbourne, underscoring the urgent national security implications.


Volt Typhoon: Targeting Power, Water, and Transport

One group in particular—Volt Typhoon—is attempting to breach systems that power everyday life:

  • Energy grids
  • Water treatment systems
  • Transportation networks

The threat isn’t theoretical. Burgess cautioned that successful intrusions could trigger widespread outages, affecting millions.

“I do not think we truly appreciate how disruptive, how devastating, this could be,” he said.
Once hackers gain access, it becomes “a matter of intent, not capability.”

The U.S. has issued similar alerts, calling Volt Typhoon a strategic cyber actor preparing to disrupt Western nations’ ability to respond to international conflict—particularly a potential Chinese invasion of Taiwan.


Salt Typhoon: Breaching Telecom Networks for Surveillance

A second China-linked group, Salt Typhoon, is also on ASIO’s radar.

  • Known for hacking phone and internet companies, Salt Typhoon steals call records, metadata, and other sensitive information.
  • According to the FBI, the group has targeted over 200 global telecom providers, including:
    • AT&T
    • Verizon
    • Lumen
    • Cloud and data center operators

The scale of these breaches prompted the FBI to recommend Americans switch to end-to-end encrypted messaging apps to protect their communications.

Canada has also confirmed similar breaches affecting its telecom infrastructure.


A Global Pattern of Escalation

Australia’s warning adds to a growing body of evidence across the Five Eyes intelligence alliance that China-backed cyber operations are:

  • Persistent
  • Broad in scope
  • Strategically aligned with long-term geopolitical goals

Chinese officials have repeatedly denied the allegations, but Western intelligence agencies continue to present mounting evidence of coordinated activity across telecom, energy, transport, and cloud networks.


The Risk Ahead: Infrastructure as a Battlefield

Burgess’ message was unequivocal: Critical infrastructure has become the frontline of modern conflict.

  • Malware can remain dormant for years.
  • Once embedded, attackers can disrupt economies, undermine public trust, or paralyze military response times.
  • The question is no longer whether these systems can be breached—but what hostile actors intend to do once inside.

Australia’s intelligence community is now working closely with U.S., U.K., and Canadian counterparts to identify vulnerabilities and coordinate defensive measures.

Share this article
Shareable URL
Prev Post

Groww’s $748M IPO Caps a New Era for Indian Fintech

Next Post

Veir’s Liquid-Cooled Cables Could Solve AI’s Next Power Bottleneck

Read next