Social Icons

Friday, March 6, 2020

Chinese security researchers attribute eleven years of CIA cyberattacks

To attribute the cyberattacks, the experts relied on the technical elements revealed by Vault 7, this set of confidential documents that a former CIA employee leaked in 2017 through WikiLeaks.

In a blog note, security researchers at the Chinese company Qihoo 360 have just highlighted the hacking activities ... of the CIA, the American intelligence service, in the Middle Empire.
According to them, Uncle Sam's cyber spies have attacked multiple Chinese industrial sectors during the past eleven years: aviation, scientific research institutes, petroleum, high-tech, etc. Government agencies have also been in their sights. The regions most affected by CIA espionage - "APT-C-39" - are Beijing, Guangdong and Zhejiang.


To detect the activities of the CIA, the researchers of Qihoo 360 relied on the technical elements revealed by Vault 7, these ultra-confidential documents that a former CIA employee leaked in 2017 through WikiLeaks and which describe a whole part of the secret agency’s cyber arsenal.
To attribute the cyber attacks to the CIA, Chinese researchers have, among other things, compared the source codes, the commands used, the compilation paths and the compilation times. These are all indications that make the probability very high that these cyber attacks were indeed perpetrated by American agents.
Also to discover on video

Incidentally, we discover that the CIA has also used NSA tools in China, such as WISTFULTOLL. This plugin appears in Edward Snowden's documents and allows you to extract information from a Windows 2000, 2003 or XP computer.
The fact that the activities of the CIA are thus thrown into the pasture in the public square can be seen as a revenge. For several years, the American authorities have regularly and publicly accused Chinese citizens of economic espionage activities. Qihoo 360's blog note is therefore a bit of a response from the shepherd to the shepherdess.

Source: Qihoo 360

No comments:

Post a Comment

Category Of Mobile Courses

Actualités (644) Adsense (1) Affiliation (1) Algebraic Topology (1) Algorithmic (1) all-news (30) Android (5) Android App (8) Android app without code (4) Android Apps (169) Android Development (4) Android download (2) Android OS (3) AngularJS (1) Automata theory and formal language (5) C programming (5) Category and Functor (8) CMS (3) Computer Glossary (18) Create Mobile App With Ionic Framework (2) CSS (2) CSS-Cascading-Style-Sheets (4) Developpement Java (13) Differential Geometry (1) Django-Python-Framework (8) dropshiping (26) Earn Money by Internet (4) Emplois (23) Framework php (2) Fraud (2) HTML (7) Java For Beginners (10) Javascript (12) Kotlin Programming Language (8) Kotlin For Mobile Android (1) Linux Download (2) Marketing (5) Mobile (3) Mobile Courses (4) Mobile Marketing (4) MoneyGram (1) News (721) Node.js (5) Open Source (1) Photoshop (1) Protect Computer (1) Python (33) Python BeautifulSoup (1) Python For Data Science (2) Python-Books (6) Python-DVD-Training (1) Python-Exercises (138) Python-Framework (1) Python-IDE (1) Python-Modules (1) Python-pdf (2) Python-pyQt (1) Référencement (2) Script PHP (2) Security (6) SEO (1) Snipping Tool: Faq (1) Social Networks (1) Source Code (1) Statistics With SPSS (2) Surveillance Software (1) Travail à domicile (6) Tutoriels php en vidéos (2) Tutoriels-MySql (6) tutoriels-php (19) Utilitaires (1) VPS (1) Web Hosting (1) Webcam (1) Webmarketing (11) Western Union (1) Windows 10 (1) Windows 7 (4) Windows 7 Faq (2) Windows 8 (1) Windows Accessories (1) Windows Download (8) Windows Drivers (1) Windows Fonts (1) Windows Power Shell (2) Windows Registry (2) Windows Security (18) Windows Software (2) Windows Spyware (2) Windows utilities (3) Windows Virus (2) Windows Vista (3) Windows Wireless (1) Windows xp (1) Wordpress (1)
 

Sample text

Sample Text

 
Blogger Templates