Ipoh Community Forums

Full Version: Exclusive: Evidence of US monitoring 45 countries, regions
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Exclusive: Evidence of US monitoring 45 countries, regions exposed by Chinese cybersecurity experts for the 1st time

[Image: 62adfda0-94d6-4b68-a268-de40dd12cac5.jpeg]

An elite hacking group under the US National Security Agency (NSA) was found to have been creating an advanced and covert backdoor which has been used to monitor 45 countries and regions for over a decade, the Global Times learned from a Beijing-based cybersecurity lab exclusively on Wednesday.

Experts from Qi An Pangu lab said on Wednesday they have declassified the full technical details and organizational links of "Telescreen" (Bvp47), a top-of-the-line backdoor created by Equation - an elite hacking group affiliated with the NSA. 

This is the first time that Chinese cybersecurity experts have publicly exposed the complete chain of technical evidence about the advanced persistent threat (APT) attack launched by Equation.

- More -
Exclusive: China captures powerful US NSA cyberspy tool

[Image: deb4a527-06f2-446e-9dc1-2c3fc91a6ced.jpeg][/align

[align=left]China captured a spy tool deployed by the US National Security Agency, which is capable of lurking in a victim's computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of users' information, according to a report the Global Times obtained from the National Computer Virus Emergency Response Center exclusively on Monday. 

According to the report, the Trojan horse, "NOPEN," is a remote control tool for Unix/Linux computer systems. It is mainly used for stealing files, accessing systems, redirecting network communication, and viewing a target device's information. 

Through technical analysis, the center believes that the "NOPEN" Trojan horse is characterized by complex technology, comprehensive functions and strong concealment, which can fit a variety of processor architectures and operating systems. It can also collaborate with other cyber weapons and is a typical tool used for cyber espionage.

- More -