Friday, February 26, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Privacy

Researchers Claim CIA Was Behind 11-Year-Long Hacking Attacks Against China

March 4, 2020
in Internet Privacy
Researchers Claim CIA Was Behind 11-Year-Long Hacking Attacks Against China
586
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Qihoo 360, one of the most prominent cybersecurity firms, today published a new report accusing the U.S. Central Intelligence Agency (CIA) to be behind an 11-year-long hacking campaign against several Chinese industries and government agencies.

The targeted industry sectors include aviation organizations, scientific research institutions, petroleum, and Internet companies—which, if true, gives the CIA the ability to do “unexpected things.”

You might also like

Russian Hackers Targeted Ukraine Authorities With Supply-Chain Malware Attack

Chinese Hackers Using Firefox Extension to Spy On Tibetan Organizations

The Top Free Tools for Sysadmins in 2021

According to the researchers, these cyberattacks were carried out between September 2008 and June 2019, and most of the targets were located in Beijing, Guangdong, and Zhejiang.

“We speculate that in the past eleven years of infiltration attacks, the CIA may have already grasped the most classified business information of China, even of many other countries in the world,” the researchers said.

“It does not even rule out the possibility that now the CIA is able to track down the real-time global flight status, passenger information, trade freight, and other related information.”

The claims made by the company are based on the evidential connection between tools, tactics, and procedures used by a hacking group, dubbed ‘APT-C-39‘ against Chinese industries, and the ‘Vault 7’ hacking tools developed by the CIA.

As you may remember, the massive collection of Vault 7 hacking tools (1, 2, 3, 4, 5, 6, 7) was leaked to the public in 2017 by the whistleblower website Wikileaks, which it received from Joshua Adam Schulte, a former CIA employee who is currently facing charges for leaking classified information.

According to Qihoo 360, the hacking tools developed by the CIA, such as Fluxwire and Grasshopper, were used by the APT-C-39 group against Chinese targets years before the Vault 7 leak.

“By comparing relevant sample codes, behavioral fingerprints, and other information, the Qihoo 360 can be pretty sure that the cyber weapon used by the group is the cyber weapon described in the Vault 7 leaks,” the researchers.

“Qihoo 360 analysis found that the technical details of most of the samples are consistent with the ones in the Vault 7 document, such as control commands, compile PDB paths, encryption schemes.”

Besides this, the researchers also noticed that the compilation time of the captured samples is consistent with the U.S. timezone.

“Through the study of the compilation time of malware, we can find out the developer’s work schedule, so as to know the approximate time zone of his location,” the researchers.

Additionally, the company also claimed that the hacking group also used some tools, such as WISTFULTOOL attacking plugin, developed by the National Security Agency (NSA) in its hacking campaigns, including against a large Chinese Internet company in 2011.

By the way, it’s not the first time when several hacking campaigns have been linked to the CIA based on the Vault 7 leaks. Where Qihoo 360 is exclusively tracking Chinese targets, researchers at Kaspersky and Symantec are tracking CIA hacking operations as Lamberts and Longhorn, against other countries.


Credit: The Hacker News By: noreply@blogger.com (Wang Wei)

Previous Post

Making Sense of the Hype Cycle for Artificial Intelligence

Next Post

Academics find 30 file upload vulnerabilities in 23 web apps, CMSes, and forums

Related Posts

Russian Hackers Targeted Ukraine Authorities With Supply-Chain Malware Attack
Internet Privacy

Russian Hackers Targeted Ukraine Authorities With Supply-Chain Malware Attack

February 26, 2021
Chinese Hackers Using Firefox Extension to Spy On Tibetan Organizations
Internet Privacy

Chinese Hackers Using Firefox Extension to Spy On Tibetan Organizations

February 25, 2021
The Top Free Tools for Sysadmins in 2021
Internet Privacy

The Top Free Tools for Sysadmins in 2021

February 25, 2021
Everything You Need to Know About Evolving Threat of Ransomware
Internet Privacy

Everything You Need to Know About Evolving Threat of Ransomware

February 25, 2021
Online Trackers Increasingly Switching to Invasive CNAME Cloaking Technique
Internet Privacy

Online Trackers Increasingly Switching to Invasive CNAME Cloaking Technique

February 25, 2021
Next Post
Academics find 30 file upload vulnerabilities in 23 web apps, CMSes, and forums

Academics find 30 file upload vulnerabilities in 23 web apps, CMSes, and forums

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Spy agency: Artificial intelligence is already a vital part of our missions
Internet Security

Spy agency: Artificial intelligence is already a vital part of our missions

February 26, 2021
Blockchain lags behind other technologies in finance adoption for now, says Broadridge
Blockchain

Blockchain lags behind other technologies in finance adoption for now, says Broadridge

February 26, 2021
Supercomputer-Powered Machine Learning Supports Fusion Energy Reactor Design
Machine Learning

Supercomputer-Powered Machine Learning Supports Fusion Energy Reactor Design

February 26, 2021
How 3D Cuboid Annotation Service is better than free Tool? | by ANOLYTICS
Neural Networks

How 3D Cuboid Annotation Service is better than free Tool? | by ANOLYTICS

February 26, 2021
21 Must-Know Instagram Facts for 2021
Marketing Technology

21 Must-Know Instagram Facts for 2021

February 26, 2021
Chinese cyberspies targeted Tibetans with a malicious Firefox add-on
Internet Security

Chinese cyberspies targeted Tibetans with a malicious Firefox add-on

February 26, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Spy agency: Artificial intelligence is already a vital part of our missions February 26, 2021
  • Blockchain lags behind other technologies in finance adoption for now, says Broadridge February 26, 2021
  • Supercomputer-Powered Machine Learning Supports Fusion Energy Reactor Design February 26, 2021
  • How 3D Cuboid Annotation Service is better than free Tool? | by ANOLYTICS February 26, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates