China directs firms to halt use of US and Israeli cybersecurity software

Chinese authorities have instructed domestic companies to stop using cybersecurity software from more than a dozen US and Israeli firms due to national security concerns. The directive supports Beijing's drive to replace Western technology with homegrown alternatives amid intensifying tech competition with the United States. Three sources familiar with the matter said the notice was issued in recent days.

Three people briefed on the matter revealed that Chinese authorities have directed domestic companies to cease using cybersecurity software from firms including Broadcom-owned VMware, Palo Alto Networks, and Fortinet from the US, as well as Israel's Check Point Software Technologies. A third source added Alphabet-owned Mandiant, Wiz whose acquisition Alphabet announced last year, CrowdStrike, SentinelOne, Recorded Future, McAfee, Claroty, and Rapid7 to the list. Israeli additions include CyberArk, acquired by Palo Alto last year, Orca Security, Cato Networks, and Imperva, bought by France's Thales in 2023.

Several companies stated they conduct no business in China. Recorded Future said it has none and intends none. CrowdStrike and SentinelOne noted minimal impact due to lacking offices, staff, or infrastructure there. Orca Security CEO Gil Geron said the firm was not notified and called a ban misguided, emphasizing its defense focus.

Broadcom shares dropped over 4% on January 14, Fortinet more than 2%, and Rapid7 over 1%. Palo Alto remained nearly flat, while Check Point closed slightly higher. Authorities worried the software might gather and send sensitive data abroad.

This fits broader US-China frictions, with a trade truce holding ahead of US President Donald Trump's planned April visit to Beijing. China fears Western gear could be hacked by foreign powers, prompting swaps for local tools like 360 Security Technology and Neusoft. Some targeted firms have accused Chinese hacking, including Check Point's report last month on a China-linked operation against a European government office and Palo Alto's September findings on attacks against diplomats worldwide.

Artigos relacionados

The EU Commission has presented a revised cybersecurity law to better fend off attacks and reduce dependencies on high-risk third countries. In particular focus: Chinese companies like Huawei and ZTE, which are to be effectively excluded from 5G rollout. This follows a recent hacker attack on the Eurail platform.

Reportado por IA

Cisco Talos detalhou como um grupo ligado à China explora uma zero-day não corrigida em appliances de segurança de e-mail desde finais de novembro de 2025, implantando backdoors e ferramentas de apagamento de logs para acesso persistente.

Hackers patrocinados pelo Estado russo weaponizaram rapidamente uma falha recém-corrigida do Microsoft Office para atingir organizações em nove países. O grupo, conhecido como APT28, usou e-mails de spear-phishing para instalar backdoors furtivas em entidades diplomáticas, de defesa e de transporte. Pesquisadores de segurança da Trellix atribuíram os ataques com alta confiança a esta unidade notória de espionagem cibernética.

Reportado por IA

Chinese cyberattacks on Taiwan's key infrastructure rose 6% in 2025 to an average of 2.63 million daily, according to the National Security Bureau. This surge forms part of 'hybrid threats' synchronized with military drills. It supports China's broader aims in technology and politics.

 

 

 

Este site usa cookies

Usamos cookies para análise para melhorar nosso site. Leia nossa política de privacidade para mais informações.
Recusar