China directs firms to halt use of US and Israeli cybersecurity software

Chinese authorities have instructed domestic companies to stop using cybersecurity software from more than a dozen US and Israeli firms due to national security concerns. The directive supports Beijing's drive to replace Western technology with homegrown alternatives amid intensifying tech competition with the United States. Three sources familiar with the matter said the notice was issued in recent days.

Three people briefed on the matter revealed that Chinese authorities have directed domestic companies to cease using cybersecurity software from firms including Broadcom-owned VMware, Palo Alto Networks, and Fortinet from the US, as well as Israel's Check Point Software Technologies. A third source added Alphabet-owned Mandiant, Wiz whose acquisition Alphabet announced last year, CrowdStrike, SentinelOne, Recorded Future, McAfee, Claroty, and Rapid7 to the list. Israeli additions include CyberArk, acquired by Palo Alto last year, Orca Security, Cato Networks, and Imperva, bought by France's Thales in 2023.

Several companies stated they conduct no business in China. Recorded Future said it has none and intends none. CrowdStrike and SentinelOne noted minimal impact due to lacking offices, staff, or infrastructure there. Orca Security CEO Gil Geron said the firm was not notified and called a ban misguided, emphasizing its defense focus.

Broadcom shares dropped over 4% on January 14, Fortinet more than 2%, and Rapid7 over 1%. Palo Alto remained nearly flat, while Check Point closed slightly higher. Authorities worried the software might gather and send sensitive data abroad.

This fits broader US-China frictions, with a trade truce holding ahead of US President Donald Trump's planned April visit to Beijing. China fears Western gear could be hacked by foreign powers, prompting swaps for local tools like 360 Security Technology and Neusoft. Some targeted firms have accused Chinese hacking, including Check Point's report last month on a China-linked operation against a European government office and Palo Alto's September findings on attacks against diplomats worldwide.

Relaterade artiklar

EU-kommissionen har lagt fram en reviderad cybersäkerhetslag för att bättre motverka attacker och minska beroendet av högriskländer utanför EU. Särskilt i fokus: kinesiska företag som Huawei och ZTE, som effektivt ska uteslutas från 5G-utrullningen. Detta följer på en nylig hackerattack mot Eurail-plattformen.

Rapporterad av AI

Cisco Talos har beskrivit hur en kinesisklänkad grupp utnyttjar en opatchad zero-day i e-postsäkerhetsenheter sedan sent november 2025, och distribuerar bakdörrar och verktyg för loggrensning för persistent åtkomst.

Ryska statsstödjda hackare vapeniserade snabbt en nyligen patchad Microsoft Office-brist för att rikta in sig på organisationer i nio länder. Gruppen, känd som APT28, använde spjutphishing-mejl för att installera smygande bakdörrar i diplomatiska, försvars- och transportenheter. Säkerhetsforskare på Trellix tillskrev attackerna med hög säkerhet till denna ökända cyberespionageenhet.

Rapporterad av AI

Chinese cyberattacks on Taiwan's key infrastructure rose 6% in 2025 to an average of 2.63 million daily, according to the National Security Bureau. This surge forms part of 'hybrid threats' synchronized with military drills. It supports China's broader aims in technology and politics.

 

 

 

Denna webbplats använder cookies

Vi använder cookies för analys för att förbättra vår webbplats. Läs vår integritetspolicy för mer information.
Avböj