China National Computer Virus Emergency Treatment Center and China Security Software Giant 360 Company jointly issued a survey report on Thursday (May 4), which refers to a network weapon tools related to the US Central Intelligence Agency.Since 2011, we have carried out cyber attacks on the targets of Chinese and other countries, and related attacks have continued to this day.The target of the attack involves important information infrastructure, aerospace, scientific research institutions, petroleum petrochemicals, large Internet companies, and government agencies in various countries.
China CCTV News reported that the above report revealed the relevant process of the CCTV Intelligence Agency's use of the Internet to attack other countries, and part of the cases that occurred in the typical cases of cybersecurity in China and other countries.Analyze the Internet attack theft and related realistic harm of the Central Intelligence Agency of the United States. "
Reported that the report will be released and suggestions for online attack victims around the world.
The US Central Intelligence Agency (CIA) is one of the main intelligence agencies of the US federal government.Other domestic intelligence agencies activities,
reports that 360 companies independently discovered a network attack organization that has never been exposed by the outside world in 2020. The organization uses network weapons related to the Central Intelligence Agency of the United States Central Intelligence Agency for targetingThe victims of China and other countries have implemented cyber attacks. Attacks can be traced back to 2011, and related attacks have continued to this day.The target of the attack involves many aspects of important information infrastructure, aerospace, scientific research institutions, petroleum petrochemicals, large Internet companies, and government agencies.
The investigation team jointly established by the National Computer Virus Emergency Treatment Center and 360 Companies found that in a large global network attack operation, the US Central Intelligence Agency uses a large number of "zero days" vulnerabilities, including includingA large number of backdoor and vulnerabilities that have not been disclosed so far (some functions have been verified). "Zombies" networks and attack springboard networks are established around the world.Entering attack invasion in stages.
The report said that during the investigation of multiple typical network attacks in China, the joint investigation team captured and successfully extracted a large number of Trojan horses closely related to the Central Intelligence Bureau of the United States Central Intelligence Agency from the victim units.Program, functional plug -in and attack platform samples.These related network weapons have undergone extremely strict standardized, processed and professional software engineering management. At present, only the US Central Intelligence Agency strictly abides by these standards and standardized development of network attack weapons.
The report also said that through empirical analysis, the joint investigation team found that the network weapons of the Central Intelligence Agency used the U.S. Central Intelligence Agency using extremely strict spy technical specifications.Almost all Internet and Internet of Things assets around the world can control other countries anytime, anywhere, and steal the important and sensitive data of other countries. This undoubtedly requires a lot of financial resources, technology and human resources support. American -style network hegemony is evident.
At present, the joint investigation team has provided the relevant situation to the public security organs in the area where the victims of the victims of China are.