1. LINE

      Text:AAAPrint
      Politics

      Volt Typhoon III report exposes U.S. cyber forces operations

      2024-10-14 17:31:20China Daily Editor : Mo Honge ECNS App Download
      The investigative report Volt Typhoon III: A Cyber Espionage and Disinformation Campaign conducted by U.S. Government Agencies was published on Monday. (Photo provided to chinadaily.com.cn)

      The investigative report Volt Typhoon III: A Cyber Espionage and Disinformation Campaign conducted by U.S. Government Agencies was published on Monday. (Photo provided to chinadaily.com.cn)

      Hackers from United States cyber forces and intelligence agencies disguise themselves like "chameleons" in cyberspace by posing as other countries to conduct global cyberattacks and espionage operations, while also pouring dirty water on non-U.S. allies like China, an investigative report published on Monday said.

      According to the report Volt Typhoon III: A Cyber Espionage and Disinformation Campaign conducted by U.S. Government Agencies, evidence has shown that "Volt Typhoon", which U.S. politicians, intelligence communities and companies claimed to be a China-sponsored hacking organization, had launched a series of operations targeting networks across critical U.S. infrastructure sectors, as just one of many operations initiated by the U.S. intelligence agency.

      The report was jointly published by the National Computer Virus Emergency Response Center and the National Engineering Laboratory for Computer Virus Prevention Technology.

      Also, according to the top-secret files of the National Security Agency, the U.S. has for long been taking advantage of its well-developed information and communication technology industry to construct internet infrastructures to control the "Choke Points" of the internet.

      There are at least seven access sites for tapping with coverage over all submarine optical cables spanning from the Atlantic to the Pacific. All these access sites are operated by NSA, the Federal Bureau of Investigation and the National Cyber Security Centre from the United Kingdom. Each information packet intercepted through the access sites are thoroughly inspected indiscriminately, the report said.

      Furthermore, the NSA will directly use the "supply chain" attack method, which capitalizes on the advantages of the advanced U.S. information and communication technology industry and products, against a variety of high-valued targets of other countries that have high levels of protection and are challenging to penetrate in cyberspace.

      With the cooperation of large internet enterprises or equipment suppliers in the U.S., NSA is able to intercept the U.S.-made network products purchased by its targets. The products will then be unpacked and implanted with backdoor malware before repackaging and shipping to the various targets.

      The method is usually used in attack operations against other countries' telecom and network operators. When NSA gets control of the target telecom network operator's system, they will be able to monitor the target's cellphone communication content. In the attack against the Northwestern Polytechnical University, the relevant internet service provider located in China was compromised by NSA with the "supply chain" attack method. As a result, the telephone calls and internet activities of the victims were tracked by NSA in real time.

      NSA used the term "pre-position" when introducing the method in top secret documents, which specifically refers to the implant "backdoor" in IT products used by the targets, which is activated through NSA's subsequent operations. Ironically, the term "pre-position" was also used by U.S. government agencies to describe the tactics used by so-called "Volt Typhoon" groups which carried out cyberattacks on critical U.S. infrastructure in places like Guam. The question surrounding "pre-position" in critical infrastructure worldwide is quite clear.

      Previously on April 15 and July 8, the two institutions published two investigative reports on "Volt Typhoon", which launched a series of operations affecting networks across critical U.S. infrastructure sectors.

      The reports stated that analysis by Chinese technical teams showed that many of the IP addresses used by "Volt Typhoon" to launch the attacks were previously used by a ransomware group named "Dark Power", which had no country and sectoral connection. And the U.S. government agencies orchestrated and hyped up the "Volt Typhoon" cyberthreat narrative to secure additional funding from the U.S. Congress and to bolster the cyber-infiltration capabilities of U.S. intelligence agencies.

      The allegation originated from a joint advisory by the cybersecurity authorities of the U.S. and its "Five Eyes" allies — the United Kingdom, Australia, Canada and New Zealand. With the advisory issued based on information released by U.S. tech company Microsoft, which has failed to provide a detailed analytical process for source tracing of the cyberattacks from "Volt Typhoon".

      Click here to read the full text of the report

      MorePhoto

      Most popular in 24h

      MoreTop news

      MoreVideo

      LINE
      Back to top About Us | Jobs | Contact Us | Privacy Policy
      Copyright ©1999-2024 Chinanews.com. All rights reserved.
      Reproduction in whole or in part without permission is prohibited.
      [網上傳播視聽節目許可證(0106168)] [京ICP證040655號]
      [京公網安備 11010202009201號] [京ICP備05004340號-1]
      主站蜘蛛池模板: 国产美女视频免费观看的网站| 黄网址在线永久免费观看| 免费国产成人α片| 久久精品国产亚洲Aⅴ蜜臀色欲| 国产91成人精品亚洲精品| 免费观看午夜在线欧差毛片| 亚洲熟妇丰满xxxxx| 国产又黄又爽又刺激的免费网址| 亚洲精品av无码喷奶水糖心| 亚洲?v女人的天堂在线观看| 最新久久免费视频| 中文字幕亚洲精品资源网| 国内一级一级毛片a免费| 国产亚洲人成在线影院| 朝桐光亚洲专区在线中文字幕| 国产无遮挡吃胸膜奶免费看| 成年女人喷潮毛片免费播放| 黄 色一级 成 人网站免费| 手机永久免费的AV在线电影网| 亚洲第一视频网站| 四虎影视精品永久免费| 亚洲精品国产精品国自产观看 | 免费国产作爱视频网站| 亚洲一区二区三区高清不卡 | mm1313亚洲精品无码又大又粗| 成人自慰女黄网站免费大全| 免费国产真实迷j在线观看| a级大片免费观看| 一级白嫩美女毛片免费| 中文字幕亚洲精品资源网| 亚洲国产精品综合久久2007| 中文亚洲成a人片在线观看| 亚洲精品成人无限看| 亚洲免费二区三区| 久久久久久久久久国产精品免费 | 日韩一区二区a片免费观看| 可以免费观看的国产视频| 国外成人免费高清激情视频| 国产精品亚洲美女久久久 | 亚洲AV成人一区二区三区AV| 亚洲一线产区二线产区区|