src='https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2513966551258002'/> Rightways: Spying Infolinks.com, 2618740 , RESELLER

Pages

Share This

Showing posts with label Spying. Show all posts
Showing posts with label Spying. Show all posts

Tuesday, March 15, 2022

China captures powerful US NSA cyberspy tool

Cybersecurity. Photo: VCG`'Trojan horse' controls global equipment

China captured a spy tool deployed by the US National Security Agency, which is capable of lurking in a victim's computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of users' information, according to a report the Global Times obtained from the National Computer Virus Emergency Response Center exclusively on Monday.
`
According to the report, the Trojan horse, "NOPEN," is a remote control tool for Unix/Linux computer systems. It is mainly used for stealing files, accessing systems, redirecting network communication, and viewing a target device's information.
`
Through technical analysis, the center believes that the "NOPEN" Trojan horse is characterized by complex technology, comprehensive functions and strong concealment, which can fit a variety of processor architectures and operating systems. It can also collaborate with other cyber weapons and is a typical tool used for cyber espionage.
`
The report came after the NSA was exposed to have been launching cyberattacks against 47 countries and regions for a decade, with Chinese government departments, high-tech companies and military-related institutes among the key targets. Under the surveillance of the NSA, the privacy and sensitive information of hundreds of millions of people around the world were exposed, like "running around naked."
`
Photo: Courtesy of National Computer Virus Emergency Response Center
Photo: Courtesy of National Computer Virus Emergency Response Center
`
Cybersecurity experts told the Global Times that once the Trojan was planted into a victim's computer, it would become a "lurker" waiting for the "code" and opening the "vault door" for hackers. The Trojan also could turn a victim's computer into a bridge tower, allowing hackers to go deeper into the group where the victim works and grasp the company's information.
`
According to the center's report, the "NOPEN" can remotely control most existing network servers and terminals, which can be manually implanted by attackers, or cyberattack platforms by the NSA. It can execute a variety of instructions such as information theft and destruction.
`
Evidence shows that the NSA used the "NOPEN" Trojan horse to control a large number of internet devices around the world and steal user privacy data, which has caused inestimable losses.
`
According to internal NSA documents leaked by hacking group Shadow Brokers, "NOPEN" is one of the powerful weapons used by the NSA's Tailored Access Operations (TAO) to attack and steal secrets.
`
"As the research and development arm of the world's top military power, the NSA cannot develop weapons that rust in their arsenals," a Chinese cybersecurity expert told the Global Times on condition of anonymity. "The international community has learned from the PRISM scandal that the US military intelligence agency has been conducting network monitoring and cybertheft of countries around the world for a long time, and these cyber weapons are an important means of its implementation of network monitoring."
`
In April 2017, the Shadow Brokers released a large number of cyberattack tools developed by the NSA. As the NSA is affiliated with the US Department of Defense, the tools are widely believed to be used for military purposes as "cyber weapons."
`
For example, on May 12, 2017, the worldwide WannaCry ransomware used EternalBlue, a computer exploit developed by the NSA to attack unpatched computers, which brought serious damage and data loss to many enterprises and individuals, according to media reports. The incident enabled the international community to witness for the first time the terrible power of cyber weapons, but such weapons of mass destruction are only the tip of the iceberg in the NSA's vast arsenal.
`
"The vast majority of the NSA's arsenal consists of stealth fighters and submarines that can easily attack victims without theirknowledge," the anonymous expert said, noting that the "NOPEN" Trojan horse is the main weapon of the NSA's arsenal.
`
The expert said the center's report sounds an alarm to the world as there are likely a large number of undetected victims online, who face long-term and serious cybersecurity risks. The leakage and proliferation of these cyber weapons further aggravate the increasingly severe network security situation, seriously endanger the overall security of the cyberspace, turning military confrontation in cyberspace into a "zero-sum" game.

 Source link

RELATED ARTICLES
 
Exclusive: New evidence shows US hijacks, monitors users' social media accounts, emails

Chinese cybersecurity experts for the first time disclosed a typical weapon used by US National Security Agency (NSA) to target ...

 
 

 

China criticizes US' inconsistency on Taiwan question at Yang-Sullivan meeting as US ...

China's top diplomat Yang Jiechi met with US National Security Advisor Jake Sullivan in the Italian capital of Rome on ..

.

Friday, March 25, 2016

Chinese hacker pleads guilty, deserves respect whether guilty or innocent


A Chinese national named Su Bin pleaded guilty in the US on Wednesday to conspiring to hack into the computer networks of several major US defense contractors to obtain sensitive information, according to a US Department of Justice statement. The information allegedly includes technical files about F-22 and F-35 fighter jets and C-17 military transport aircraft.

The statement says "Su Bin admitted to playing an important role in a conspiracy, originating in China," where he has two accomplices. Some US media have conjectured that the two accomplices must be Chinese military personnel.

Su was arrested in Canada in July 2014, and was handed over to the US this February. The Chinese government has denied any involvement in Su's case, and the Chinese Ministry of Foreign Affairs has asked the US to ensure the privacy and legal rights of Chinese citizens on US soil.

Plea bargaining is a common US judicial practice. Defendants can plead guilty in exchange for softer punishments. The disadvantage of this practice is that it is hard to know what the defendants truly think, and whether there might be any wrongs in the judgments.

Every country is gathering intelligence. The largest and most well-known information-collecting agencies are the CIA and FBI in the US. The FBI has even listed China as their top target. Recent years have seen the FBI arresting quite a few "Chinese spies," but most of them proved to be innocent. In the meantime, China has kept a low profile in reporting the exposure of US spies out of various considerations.

In most cases, governments won't acknowledge these spies after they have been caught. For example, whenever China intercepted spies from Western countries, the governments they served routinely denied any connection and even mobilized the Western media to attack China's human rights and win over sympathy.

We have no reliable source to identify whether Su has stolen these secrets and transferred them to the Chinese government. If he has, we are willing to show our gratitude and respect for his service to our country. On the secret battlefield without gunpowder, China needs special agents to gather secrets from the US. As for Su, be he recruited by the Chinese government or driven by economic benefits, we should give him credit for what he is doing for the country.

If Su was wronged and forced to plead guilty, he should have our sympathy. As the "war of information" between China and the US continues, there will probably be more Chinese framed as spies and jailed in the US. This is a tragedy of the times, and we hope the Chinese working in sensitive professions in the US can protect themselves.

At the helm of international public discourse, the US is able to define whether certain activities are espionage or not. When US espionage is exposed, the US media will try to divert public attention and tone down the case. But when the CIA or FBI catches suspects, hyperbole about these cases makes headlines in US media.

The most infamous case is that of Edward Snowden, who revealed the global US surveillance program PRISM. The whistleblower is wanted by the US government, which refuses to reflect on its behavior, but keeps criticizing China for espionage without solid proof.

China lags behind the US in technology. The existence of US cyberspace military forces is openly known to the public, and its capability is way higher than Chinese "hackers." But it doesn't mean that China cannot fight back in the face of ill-founded US accusations of Chinese spies. China should uncover Washington's brazen hypocrisy with concrete evidence. - Global Times

Related posts:
 
 
Jun 23, 2013 ... Revelations about PRISM, a US government program that harvests data on the ... against the US Internet surveillance program of the NSA, PRISM, .... US Spy Snowden Says U.S. Hacking China Since 2009 ... Labels: civil liberties , Computer hackers , Cyber Attacks , Edward Snowden , Espionage , FBI ...
 
May 21, 2014 ... Documents leaked by former Central Intelligence Agency contractor Edward Snowden detailed the National Security Agency's (NSA) ...
 
 
 
May 20, 2014 ... After the Prism program leaked by Edward Snowden, the United States was accused by the whole world. However, it has never made ...
 
 
Oct 31, 2013 ... ... intelligence whistleblower Edward Snowden.A top secret map dated August 13 , 2010 lists nearly a hundred surveillance facilities worldwide, ...
 
Jun 4, 2014 ... In June 2013, Edward Snowden, a former US National Security Bureau contractor, revealed US intelligence agencies were conducting ...
 
May 22, 2014 ... ... charging five Chinese nationals of alleged commercial espionage, citing Edward Snowden's revelations of US spying operations worldwide.
 
 
A spokesperson for China's State Internet Information Office on Monday published the latest data of U.S. cyber attack, saying that Chinese... 


As the most notorious surveillance country, the U.S. indictment of Chinese military officers seems almost insolent in a world still reeli...