CNN reported that Chinese state-linked hackers infiltrated several U.S. legal and technology firms in a campaign that stretched for months, if not longer. According to U.S. officials, the attackers gained unauthorized access to internal systems and siphoned sensitive data, much of it tied to trade negotiations and ongoing commercial disputes between Washington and Beijing. The revelations underscore how cyber intrusions are increasingly deployed as instruments of geopolitical leverage, blending technical infiltration with economic and diplomatic strategy.
While details are still emerging, investigators believe the attackers used custom malware and targeted spear-phishing campaigns to gain a foothold. What distinguishes this operation from routine corporate espionage is its timing and scope: the firms involved were not chosen at random but were directly engaged in cases and contracts connected to high-stakes trade disagreements.
Cybersecurity experts have long warned that law firms and technology vendors are attractive targets because they sit at the crossroads of sensitive commercial information. Law firms, in particular, act as custodians of confidential documents, negotiations, and intellectual property that often rival the value of their clients’ own networks. For adversarial states, breaching a law firm is akin to stealing directly from the corporate boardroom.
Technology firms, meanwhile, are simultaneously providers of critical infrastructure and innovators whose intellectual property can shift competitive advantage. By focusing on these sectors, attackers gain insights into both strategy and substance: how disputes may unfold, where negotiations are heading, and what technological edges might be worth copying or undermining.
Unlike smash-and-grab ransomware incidents, espionage campaigns tend to emphasize subtlety and longevity. In some cases, attackers remained inside networks for months without detection, carefully maintaining access while avoiding disruptions that might alert defenders.
One technique that has drawn particular attention is the use of a custom backdoor known as BRICKSTORM. This tool is designed to sustain long-term access and to selectively exfiltrate high-value information, such as the email inboxes of senior executives. Its deployment reflects the patience and precision characteristic of intelligence-focused operations.
This campaign also highlights a broader shift in tactics, where attackers are moving away from indiscriminate data theft toward more surgical intelligence gathering. Legal and technology firms, which sit at the intersection of economic and regulatory influence, have become especially attractive targets. Increasingly, adversaries are also focusing on software suppliers and third-party vendors as pathways into larger ecosystems.
This case is not without precedent. In recent years, Chinese-linked actors have compromised U.S. telecommunications providers to gain access to sensitive metadata and wiretap systems. They have also breached federal agencies, including the U.S. Treasury Department, by exploiting third-party vendors, leading to official classifications of “major incidents.”
In addition, U.S. authorities have indicted Chinese nationals and imposed sanctions in response to ongoing cyber espionage campaigns, underscoring that these operations are treated as strategic threats rather than isolated crimes.
Taken together, these events point to a deliberate strategy: diversifying targets and methods to gather intelligence across economic, legal, and government domains.
One of the key lessons is that risk no longer stops at a company’s own firewall. Even organizations with strong defenses are vulnerable if their legal advisors, technology partners, or software providers are compromised. Governance programs must account for this “indirect attack surface,” with due diligence, contractual requirements, and ongoing third-party security audits becoming essential tools.
This campaign also challenges traditional notions of sensitive information. Beyond financial records or customer data, strategic materials such as litigation strategies, intellectual property roadmaps, and trade negotiation documents can be equally valuable. Governance frameworks should elevate these assets to the highest tier of protection, ensuring strict access controls, segmentation, monitoring, and encryption.
The post Chinese Hackers Breach U.S. Firms as Trade Tensions Rise appeared first on Centraleyes.
*** This is a Security Bloggers Network syndicated blog from Centraleyes authored by Rebecca Kappel. Read the original post at: https://www.centraleyes.com/chinese-hackers-breach-u-s-firms-as-trade-tensions-rise/