Dynamics of The U.S.-China Relationship Post-Firewall Malware Attack

Authors

  • Dara Cantika Putriadin Boer Universitas Komputer Indonesia, Indonesia
  • Fahriy Aulia Wardhana Universitas Komputer Indonesia, Indonesia
  • Muhammad Arifin Universitas Komputer Indonesia, Indonesia
  • Nadhira Fitria Zahra Universitas Komputer Indonesia, Indonesia
  • Dewi Triwahyuni Universitas Komputer Indonesia, Indonesia

Keywords:

China, Cyber Security, National Security, United States

Abstract

This study analyzes the impact of the Firewall Malware attack on US-China bilateral relations and its implications for global cybersecurity policy. The attack, detected in late 2024, exploited firewall vulnerabilities in US government and private sector systems, leading to significant data breaches. The US attributed the attack to a hacker group allegedly affiliated with the Chinese government, while China denied the allegations, escalating geopolitical tensions and undermining the 2015 US-China Cyber Agreement. Using a qualitative research methodology with a case study approach, this study examines government reports, cybersecurity analyses, policy statements, and media coverage, applying content analysis to assess geopolitical consequences and the effectiveness of international cybersecurity agreements. The findings reveal that the attack intensified US-China tensions, prompting sanctions, policy shifts, and heightened cybersecurity measures. The US reinforced its cyber defence strategies and imposed economic restrictions, while China sought to build alliances to counter the accusations. The study highlights the failure of existing international cybersecurity agreements in preventing state-sponsored cyber threats, emphasizing the urgent need for stronger global cooperation and regulatory frameworks to mitigate cyber conflicts and enhance cybersecurity resilience.

References

[1] Adenuga, A. O., and Abiodun, T. E. (2023). China-US cyber-attacks and international security. Nnamdi Azikiwe Journal of Political Science, 8(2), 86-97.

[2] Anisa, G., and Widianingsih, F. (2024). SolarWinds Attack: Stages, Implications, and Mitigation Strategies in the Cyber Age. Electronic Integrated Computer Algorithm Journal, 2(1), 47-52.

[3] Birahayu, D. (2023). Maritime Digital Diplomacy: Legal Revitalization and Reform of Modern and Solutive Diplomacy. Audito Comparative Law Journal (ACLJ), 4(3), 170-184.

[4] Li, Y., and Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176-8186.

[5] Sun, P., Doh, J., Rajwani, T., Werner, T., and Luo, X. R. (2024). The management of socio‐political issues and environments: Toward a research agenda for corporate socio‐political engagement. Journal of Management Studies, 61(2), 277-306.

[6] Górka, M. (2023). Conceptualising securitisation in the field of cyber security policy. Journal of Modern Science, 53(4), 263-290.

[7] Haryanto, A., and Sutra, S. M. (2023). Upaya Peningkatan Keamanan Siber Indonesia oleh Badan Siber dan Sandi Negara (BSSN) Tahun 2017-2020. Global Political Studies Journal, 7(1), 56-69.

[8] Hansen, L., and Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International studies quarterly, 53(4), 1155-1175.

[9] Srijithesh, P. R., Gijo, E. V., Raja, P., Bhat, S., Mythirayee, S., Taallapalli, A. V. R., and Aravinda, H. R. (2025). Leveraging Lean Six Sigma principles in an Indian tertiary care hospital: a case study. International Journal of Quality & Reliability Management, 42(2), 600-630.

[10] Prasetyawan, L. D., Maharanie, C., and Adilegowo, Y. (2023). Teknologi Intelijen dan Peperangan Hibrida. Jurnal Kewarganegaraan, 7(2), 1942-1949.

[11] Khan, Z. F. (2025). Cyber Warfare and International Security: A New Geopolitical Frontier. The Critical Review of Social Sciences Studies, 3(2), 513-527.

[12] Rudner, M. (2013). Cyber-threats to critical national infrastructure: An intelligence challenge. International Journal of Intelligence and CounterIntelligence, 26(3), 453-481.

[13] Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.

[14] Ali, S., Rehman, S. U., Imran, A., Adeem, G., Iqbal, Z., & Kim, K. I. (2022). Comparative evaluation of ai-based techniques for zero-day attacks detection. Electronics, 11(23), 3934.

[15] Mallick, M. A. I., and Nath, R. (2024). Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments. World Scientific News, 190(1), 1-69.

Downloads

Published

2025-05-28

How to Cite

Dynamics of The U.S.-China Relationship Post-Firewall Malware Attack. (2025). International Journal of Research and Applied Technology (INJURATECH), 5(1), 82-92. https://ojs.unikom.ac.id/index.php/injuratech/article/view/16169