Dynamics of The U.S.-China Relationship Post-Firewall Malware Attack
Keywords:
China, Cyber Security, National Security, United StatesAbstract
This study analyzes the impact of the Firewall Malware attack on US-China bilateral relations and its implications for global cybersecurity policy. The attack, detected in late 2024, exploited firewall vulnerabilities in US government and private sector systems, leading to significant data breaches. The US attributed the attack to a hacker group allegedly affiliated with the Chinese government, while China denied the allegations, escalating geopolitical tensions and undermining the 2015 US-China Cyber Agreement. Using a qualitative research methodology with a case study approach, this study examines government reports, cybersecurity analyses, policy statements, and media coverage, applying content analysis to assess geopolitical consequences and the effectiveness of international cybersecurity agreements. The findings reveal that the attack intensified US-China tensions, prompting sanctions, policy shifts, and heightened cybersecurity measures. The US reinforced its cyber defence strategies and imposed economic restrictions, while China sought to build alliances to counter the accusations. The study highlights the failure of existing international cybersecurity agreements in preventing state-sponsored cyber threats, emphasizing the urgent need for stronger global cooperation and regulatory frameworks to mitigate cyber conflicts and enhance cybersecurity resilience.
References
[1] Adenuga, A. O., and Abiodun, T. E. (2023). China-US cyber-attacks and international security. Nnamdi Azikiwe Journal of Political Science, 8(2), 86-97.
[2] Anisa, G., and Widianingsih, F. (2024). SolarWinds Attack: Stages, Implications, and Mitigation Strategies in the Cyber Age. Electronic Integrated Computer Algorithm Journal, 2(1), 47-52.
[3] Birahayu, D. (2023). Maritime Digital Diplomacy: Legal Revitalization and Reform of Modern and Solutive Diplomacy. Audito Comparative Law Journal (ACLJ), 4(3), 170-184.
[4] Li, Y., and Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176-8186.
[5] Sun, P., Doh, J., Rajwani, T., Werner, T., and Luo, X. R. (2024). The management of socio‐political issues and environments: Toward a research agenda for corporate socio‐political engagement. Journal of Management Studies, 61(2), 277-306.
[6] Górka, M. (2023). Conceptualising securitisation in the field of cyber security policy. Journal of Modern Science, 53(4), 263-290.
[7] Haryanto, A., and Sutra, S. M. (2023). Upaya Peningkatan Keamanan Siber Indonesia oleh Badan Siber dan Sandi Negara (BSSN) Tahun 2017-2020. Global Political Studies Journal, 7(1), 56-69.
[8] Hansen, L., and Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International studies quarterly, 53(4), 1155-1175.
[9] Srijithesh, P. R., Gijo, E. V., Raja, P., Bhat, S., Mythirayee, S., Taallapalli, A. V. R., and Aravinda, H. R. (2025). Leveraging Lean Six Sigma principles in an Indian tertiary care hospital: a case study. International Journal of Quality & Reliability Management, 42(2), 600-630.
[10] Prasetyawan, L. D., Maharanie, C., and Adilegowo, Y. (2023). Teknologi Intelijen dan Peperangan Hibrida. Jurnal Kewarganegaraan, 7(2), 1942-1949.
[11] Khan, Z. F. (2025). Cyber Warfare and International Security: A New Geopolitical Frontier. The Critical Review of Social Sciences Studies, 3(2), 513-527.
[12] Rudner, M. (2013). Cyber-threats to critical national infrastructure: An intelligence challenge. International Journal of Intelligence and CounterIntelligence, 26(3), 453-481.
[13] Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.
[14] Ali, S., Rehman, S. U., Imran, A., Adeem, G., Iqbal, Z., & Kim, K. I. (2022). Comparative evaluation of ai-based techniques for zero-day attacks detection. Electronics, 11(23), 3934.
[15] Mallick, M. A. I., and Nath, R. (2024). Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments. World Scientific News, 190(1), 1-69.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.