1. LINE

      Text:AAAPrint
      Sci-tech

      Identity of NSA hacker behind cyberattack on China's leading aviation university identified; to be disclosed in due course: source

      2023-09-14 13:52:24Global Times Editor : Li Yan ECNS App Download

      During the investigation of the cyberattack against Northwestern Polytechnical University (NPU), a leading Chinese aviation university, China has successfully extracted multiple samples of the spyware named SecondDate, and with the collaborative efforts of partners in various countries, the real identity of the U.S.' National Security Agency (NSA) personnel responsible for launching the cyberattack on NPU has been successfully identified, Global Times learnt from National Computer Virus Emergency Response Center (CVERC) and Chinese internet security company 360 on Thursday.

      In June 2022, NPU issued a public statement stating that it had been subjected to a cyberattack, with a hacker organization from overseas attempting to steal relevant data.

      Afterwards, China successfully detected the mastermind behind this cyberattack was the Office of Tailored Access Operations (TAO, Code S32) under the Data Reconnaissance Bureau (Code S3) of the Information Department (Code S) of NSA.

      According to internal documents exposed by the group "Shadow Brokers," SecondDate is a cyber weapon developed by the NSA. It is primarily deployed on target network boundary devices such as gateways, firewalls, and edge routers. It covertly monitors cyber traffic and, as needed, selectively redirects, intercepts, and manipulates specific network sessions.

      The latest information shows that the CVERC and the company 360, during the investigation of this cyberattack case, have successfully extracted multiple samples of the spyware and identified the true identity of the NSA personnel behind this cyber "spying" case.

      The subsequent technical analysis revealed that the involved spyware is a highly advanced cyber espionage tool. The developers must have a very deep understanding of cyber technology, especially network firewall technology. It is equivalent to installing a set of content filtering firewalls and proxy servers on the target network devices, allowing the attacker to completely take control of the target network devices and the network traffic passing through them. This enables the attacker to carry out long-term theft on other hosts and users in the target network, and serve as a "forward base" for delivering more cyberattack weapon toward target network at any time.

      The spyware concerned is usually used in conjunction with various firewall and router vulnerability exploitation tools of TAO. After successful vulnerability exploitation and obtaining the corresponding permissions, it is implanted into the target device. The control of spyware is divided into server-side and control-side. The server-side is deployed on the target network boundary devices such as gateways, firewalls, or edge routers, and it monitors and filters all traffic in real-time through underlying drivers. The control-side triggers the activation mechanism by sending specially crafted packets, and the server-side parses the reconnect IP address from the activation packet and initiates a connection, then choose any target within the network to carry out a man-in-the-middle attack according to actual needs.

      The network connection uses the UDP protocol, and the communication is encrypted throughout. The communication port is random. The control-side can remotely configure the working mode of the server-side and the target of hijacking.

      According to relevant sources, Chinese side and its industry partners have conducted technical investigations worldwide. Through tracing, they have discovered hidden spyware and its derivative versions in thousands of network devices spread across multiple countries and regions. They have also found jump servers remotely controlled by the NSA in countries and regions including Germany, Japan, South Korea, India, and China's Taiwan region.

      "With the strong collaboration of partners in multiple countries, we have made significant breakthroughs and have successfully identified the true identity of the NSA personnel responsible for launching cyberattacks against NPU."

      The successful extraction and tracing of the spyware sample further demonstrates China's determination to prevent and defend against U.S. government-backed cyberattacks and safeguard global cyber security. This practice of revealing the details of cyber crimes launched by the U.S. government to the world also proves that China has a "visible" foundation in cyber technology, which can effectively assist our country and other nations in perceiving risks, identifying threats, and resisting attacks, thereby exposing state-sponsored hacker attacks to the public.

      Relevant sources have told the Global Times that the real identities of individuals involved in NSA's cyberattacks will be disclosed through the media in due course. It is believed that this will once again draw global attention to the U.S. government's indiscriminate cyberattacks on other countries.

      Related news

      MorePhoto

      Most popular in 24h

      MoreTop news

      MoreVideo

      LINE
      Back to top About Us | Jobs | Contact Us | Privacy Policy
      Copyright ©1999-2023 Chinanews.com. All rights reserved.
      Reproduction in whole or in part without permission is prohibited.
      [網上傳播視聽節目許可證(0106168)] [京ICP證040655號]
      [京公網安備 11010202009201號] [京ICP備05004340號-1]
      主站蜘蛛池模板: 成年女人毛片免费播放视频m| 国产成人无码精品久久久免费| 可以免费观看的毛片| 亚洲国产天堂久久综合| 亚洲AV无码一区二区三区电影| 思思99re66在线精品免费观看| 亚洲一区中文字幕在线电影网| 在线观看免费视频资源| 亚洲电影在线播放| 亚洲美女免费视频| 国产成人亚洲精品| 国产精品色午夜免费视频| 国产精品亚洲综合一区在线观看| 国产成人免费A在线视频| 美女露隐私全部免费直播| www国产亚洲精品久久久| 亚洲一区二区三区免费| 伊人久久大香线蕉亚洲| 国产免费AV片在线观看| 亚洲成人高清在线观看| 毛片免费观看的视频在线| 亚洲精品av无码喷奶水糖心| 亚洲福利精品一区二区三区| 中文永久免费观看网站| 久久久久亚洲AV成人片| 免费观看理论片毛片| 国产精品免费久久久久久久久| 久久精品7亚洲午夜a| 亚洲AV成人无码久久精品老人| 无码人妻精品中文字幕免费| 亚洲AV无码久久久久网站蜜桃| 在线观看永久免费视频网站| 中文字幕免费在线视频| 亚洲电影免费观看| 国产成人在线免费观看| 国产一区二区免费| 亚洲www77777| 亚洲色大成网站WWW久久九九| 4虎永免费最新永久免费地址| 高潮毛片无遮挡高清免费| 亚洲高清在线观看|