November 07, 2025
CNAS Insights | The Cost of Silence on China’s Cyber Aggression
Just weeks before the much anticipated meeting between President Donald Trump and General Secretary Xi Jinping, the United States discovered yet another major China-backed cyber intrusion. But instead of confronting his counterpart about Beijing’s cyber aggression, President Trump appeared to stay silent. Trump’s decision to avoid publicly addressing Xi continues a presidential pattern that risks emboldening China to advance its cyber operations against the United States.
On October 15, reporting uncovered that China-backed hackers had carried out a long-term intrusion of F5, a cybersecurity vendor for U.S. government agencies and 85 percent of Fortune 500 firms. The cyberattack was significant enough to trigger an emergency directive by the lead U.S. cyber agency. Just a few months before the F5 attack, Chinese state-backed hackers had exploited a SharePoint vulnerability that compromised data from multiple U.S. federal agencies and impacted hundreds of entities worldwide across critical infrastructure and government. In the fall of 2024, Salt Typhoon carried out a major cyber breach of U.S. telecommunications companies that, according to an FBI official, likely has “stolen information from nearly every American.” The breach even
compromised data from President Trump himself.
In the fall of 2024, Salt Typhoon carried out a major cyber breach of U.S. telecommunications companies that, according to an FBI official, likely has “stolen information from nearly every American.”
Despite China’s escalating cyber aggression, U.S. presidents have been inconsistent in confronting the Chinese leader on the issue. President Joe Biden raised “deep concerns” about China’s targeting of critical infrastructure during his meeting with Xi in 2024, but readouts of bilateral meetings from 2021 and 2023 lacked any mention of cyber, despite the United States enduring brazen cyberattacks from Beijing during this period.
In China’s highly centralized, top-down political structure, presidential statements are essential to signal resolve to Xi. Cybersecurity alerts from law enforcement agencies and the occasional, strongly worded statement from a senior official are wholly insufficient. They may even signal weakness. If Washington is serious about signaling resolve to Xi, the U.S. president must deliver the message directly. As the U.S. national cyber director has warned, “We cannot expect [China’s] behavior to change if we're ambiguous about it.”
Of course, cyber competes with many other priorities in the increasingly tense bilateral relationship. Understandably, Trump and Xi’s discussion in Busan was primarily focused on trade and tariffs. But if the president can raise fentanyl—as he should have—then he should also have addressed Beijing’s growing hacks against the U.S. homeland. Both impact ordinary Americans.
If Washington is serious about signaling resolve to Xi, the U.S. president must deliver the message directly.
For years, China-backed espionage operations targeted select companies and government agencies. Now, Beijing is infiltrating civilian critical infrastructure—jeopardizing the systems that Americans rely on for water, electricity, and transportation, according to testimony from former FBI Director Christopher Wray. He emphasized that Beijing could use this access to sabotage infrastructure during a future conflict to paralyze the U.S. response. Chinese diplomats have reportedly admitted as much, acknowledging that Beijing is infiltrating U.S. critical infrastructure to gain leverage over the United States for its support for Taiwan.
There is even evidence to suggest Beijing has used cyberattacks to hit the Trump administration where it hurts the most. Ahead of trade talks in late summer, Chinese state-backed hackers impersonated
Representative John Moolenaar, the chairman of the House Select Committee on the Chinese Communist Party, to target U.S. trade groups, law firms, and agencies with malware. Analysts suspect this was part of an espionage operation aimed at tilting the outcome of upcoming trade talks in China’s favor. By leaving Beijing’s cyber aggression unaddressed, President Trump risks handing Xi a free pass to wield cyber operations to undermine his leverage on a core policy priority in future summits.
By leaving Beijing’s cyber aggression unaddressed, President Trump risks handing Xi a free pass to wield cyber operations to undermine his leverage on a core policy priority in future summits.
As China expands its offensive cyber operations, the United States has fallen on the back foot on cyber defense, making it even more critical for the Trump administration to signal strength to Xi. The legal backbone for cyber incident response, the Cybersecurity Information Sharing Act of 2015, just lapsed, and Congress has thus far failed to reauthorize it. As a result, private sector companies lack the legal clarity to share detailed cyber threat intelligence with the government. This degrades Washington’s ability to respond effectively to cyberattacks on critical infrastructure.
Strong signaling is especially important given the Trump administration’s approach to cyber deterrence. Senior Trump administration officials have repeatedly emphasized the need to improve deterrence against Beijing’s cyber operations, calling to expand offensive cyber capabilities to impose greater costs on Chinese hackers. But deterrence is not only about having the ability to inflict costs; it’s also about making the adversary believe you have the power and intent to do so. Because offensive cyber actions are covert by design, they won’t register with Xi unless paired with clear, public statements.
Silence at the top sends the wrong message—that Washington has accepted Beijing’s cyber operations as the status quo. This is exactly the normalization that China seeks to achieve. To change course, President Trump needs to deliver a message to Xi personally during their next summit: Beijing must stop its escalating cyber aggression against the United States or face real consequences.
Morgan Peirce is a research assistant for the Technology and National Security Program at the Center for a New American Security, supporting the Center’s research on quantum technology and cybersecurity.
More from CNAS
-
Seoul, Washington Formalize Nuclear Sub Talks; North Korea Contact Eyed via Condolence Diplomacy
South Korea and the United States are deepening their military cooperation, with nuclear-powered submarines on the table and wartime operational control once again under discu...
By Dr. Go Myong-Hyun
-
Trump’s Week in Asia: Gifts, Deals, and Submarines
This article was originally published on War on the Rocks. Trump’s trip generated several positive outcomes. He showed up, which matters disproportionately in far-flung Asia. ...
By Jacob Stokes
-
Defense / Indo-Pacific Security / Technology & National Security
To Compete with China on Military AI, U.S. Should Set the StandardsThe United States has an opportunity to lead in global norms and standards for military AI at a critical moment, when the foundations laid today could shape how militaries use...
By Jacob Stokes, Paul Scharre & Josh Wallin
-
Arirang News | China to Host APEC 2026
Dr. Go Myong-hyun, CNAS adjunct senior fellow, joined Arirang News to discuss the closing of the recent APEC Economic Leaders' Meeting 2025, the upcoming summit between Chines...
By Dr. Go Myong-Hyun
