The Ministry of National Security of China announced on Monday (November 27) to announce a case of "technical services" for Chinese network engineers to provide foreign institutions, pointing out that similar services were suspected of illegal and reminded network service agencies and practitioners to improveBe wary, the network space seems to be invisible, but the spy shadow is heavy, full of smoke.
The public account of the Ministry of National Security published an article saying that the current cyber space has become an important channel for overseas spy intelligence agencies to penetrate Chinese secrets. Cyber spy activities are becoming more active, accurate technical attacks are violent, and the stealing methods have emerged endlessly.Threats the security of China.With the rapid popularization of Chinese network technology applications, the network technology service industry has become a new goal of penetrating secrets of overseas spy intelligence agencies, avoiding China's network security supervision and protection system, and implementing cyber spy behavior.
A case published by the article shows that an engineer who is engaged in network technology in China has been contacted by a foreign software developer earlier this year to invite him to configure the "digital signature certificate" for dozens of software in batches., "Venom Software Test" in order to "successfully pass" China cybersecurity certification testing and promise to pay high compensation.
The article said that with the deepening of the communication, the software developer then asked the engineer to use the designated software and encryption links to connect with it, and the contradictions and abnormal behaviors before the speech.Engineers realized that this foreign software developer is by no means an ordinary commercial institution. If it provides "technical services" for it, software with hidden security risks will bypass China's network security supervision and enter the Chinese application market.However, driven by the temptation of economic interests, knowing the harm is lucky, it is lucky. It has established a cooperative relationship with the foreign software developers and provides "technical services" for dozens of software.
The article revealed that foreign software developers who established a "cooperative relationship" with the engineer are the true identity is the overseas spy intelligence agency.Those software provided by engineers with "technical services" are bundled with special Trojan horses virus procedures. Once you are clicked and run, you will invade and control network devices such as computers, servers, and steal documents, data and data.The spy intelligence agency used these "poisoning" software to implement network attack secrets on dozens of national defense military units and high -tech enterprises in China.
After discovering and identifying the situation, the Chinese national security organs promptly notified relevant units to carry out disposal in accordance with the law to avoid major harm and losses.The engineer involved also paid the price for his "luck" and was punished by the national security organs in accordance with the law.
The article emphasizes that the network space seems to be invisible, but the spy shadow is heavy and full of smoke.Digital signatures, digital certificates, security tests, network domain names, cloud servers, e -mail and other network assets and services may be used by overseas spy intelligence agencies to use cyber attacks to steal secret activities.
The article reminds the network service agencies and practitioners to increase their vigilance and polish their eyes. When suspicious persons are encountered when purchasing technical support services, they put forward "special" requirements, or discover network attacks, invasion, interference, control,, control, control,, control, control, control, control, control, control, control,, control, control, control, control, control,, control, control, control, control, control,, control, control, control, control,, control, control,, control, control, control, control,, control, control,, control, control,, control, control, control, control, control,, control, control, control, control,, control, control, control, control, control,, control, control, controlling, controlling, controlling, controlling,.Destruction such as illegal activities should retain evidence in time and report through relevant channels.