China’s Ministry of State Security announced this in its official statement todayWeChatThe article “Uncovering the main nefarious means of cyber attacks and secret theft by US intelligence agencies” was published on this issue. The three strategies used to expose the US cyberattack are to build up a cyberattack arsenal, force related technology companies to open backdoors to cooperate, and confuse black and white and catch the thief. Have to shout for. The article states that US intelligence agencies use these weapons and equipment extensively to target China,Russia45 countries and regions around the world have experienced cyberattacks and cyberattacks for more than ten years.detectiveIn action, the targets of network attacks cover core and critical sectors such as telecommunications, scientific research, economy, energy and military. They also use technology companies’ tools and software to install backdoors, and leverage the influence of their global technology companies to monitor and steal global data.
The article said that recently, China’s National Computer Virus Emergency Response Center reported that it successfully removed a spyware sample called “Second Date” while dealing with a cyber attack on Northwestern Polytechnic University. The United States has a poor record in the field of cybersecurity. In a series of cyber attacks and theft of secrets by US intelligence agencies exposed by the National Security Agency, the despicable strategy of “hacker missions” to maintain “cyber hegemony” has come to light.
It says one of its strategies is to “build an arsenal of cyber attack weapons”. The US intelligence agency relies on its powerful cyber attack arsenal and does everything possible to carry out surveillance, secret theft and cyber attacks on many countries around the world, including China. In particular, the US National Security Agency, through its associated Special Infiltration Operations Office (TAO) and advanced weapons arsenal, has repeatedly conducted systematic and platform-based attacks on China in an attempt to steal China’s critical data resources.
The article alleged that in 2009, the Special Intrusion Operations Office began attacking servers at Huawei headquarters and continued to monitor them. In September 2022, it was revealed that it had carried out thousands of malicious network attacks on home network targets including Northwestern Polytechnic University, taking control of thousands of network devices and stealing large amounts of high-value data.
It said that the US intelligence agency is capable of launching large-scale cyber attacks, which is naturally inseparable from the support of diverse cyber attack weapons. Since 2022, Chinese cyber security agencies have disclosed several US intelligence agency cyber attack weapons, such as “Operation Telescreen (BVP47)”, “Quantum”, “Foxcid”, and “Hive” vets. The US intelligence agency has used these large-scale weapons and tools to carry out cyber attacks and cyber espionage operations against China, Russia and other 45 countries and territories around the world for more than ten years. Targets of cyberattacks include telecommunications, scientific research, the economy, and energy. and military and other key critical areas.
The second strategy is to “force relevant technology companies to open backdoors to cooperate.” The article said that on national security grounds, the US government has used the Foreign Intelligence Surveillance Act and other bills to force implants in equipment and software. and applications from relevant technology companies. Backdoors use embedded code, vulnerability attacks, etc., and leverage the influence of their global technology companies to monitor and steal global data.
It said that in December 2020, American location data company walked. In April 2022, “Anomaly Six”, a company with a US military intelligence background, was revealed to have embedded its internal tracking software development kit into multiple mobile applications to track the location data and data of millions of mobile phones around the world. View messages and collect this data and sell it to the US government.
The third trick is to “confuse right and wrong and call the thief to catch the thief.” The article states that while the United States is conducting cyber attacks and stealing secrets from countries around the world, it is also creating different versions of it. The “security report” variously discredits China as a “cyber threat subject” and exaggerates the so-called “Chinese cyber theft” issue and paraphrases “the opposite of right and wrong” for the sake of completeness .
It said that as we all know, it has long been an open secret that the United States has long relied on its technological advantages to conduct large-scale espionage and cyber theft on countries around the world, including its allies. Has been trusting. Since the “Prism Gate” incident was exposed in 2013, relevant Chinese cybersecurity agencies have repeatedly discovered the presence of the United States in cyber attacks against China. In recent years, the United States has stepped up its “forward hunting” campaign with clear targets. Russia, Iran, China and North Korea are its main targets. U.S. Cyber Command is becoming an expeditionary force, carrying out cyber attacks and covert evasion against other countries under the guise of “protest” and active defense.
But at the same time, the United States is trying its best to portray itself as a “victim of cyber attacks.” Under the banner of “maintaining network security”, it encourages and forces other countries to join the so-called “clean network”. Chinese enterprises have planned this in an attempt to eliminate it from the international network market. In fact, “clean Internet” is a lie, but suppressing opponents and maintaining hegemony is the truth. In this regard, Chinese officials have repeatedly urged the United States to think deeply, stop cyber attacks and steal secrets against the world, and stop misleading the public with all kinds of misinformation.
The article concluded that at present, cyberspace has become a new battlefield for the protection of national security. Without network security, there will be no national security, no stable economic and social operations, and it will be difficult to protect the interests of the broader public. Let us join hands to strengthen security awareness, improve security capabilities, and jointly maintain network security.