Exclusive: Evidence of US monitoring 45 countries, regions - Printable Version +- Ipoh Community Forums (https://forums.ipoh.com.my) +-- Forum: Information Technology (https://forums.ipoh.com.my/forum-14.html) +--- Forum: Computer Software (https://forums.ipoh.com.my/forum-16.html) +--- Thread: Exclusive: Evidence of US monitoring 45 countries, regions (/thread-5000.html) |
Exclusive: Evidence of US monitoring 45 countries, regions - superadmin - 02-24-2022 Exclusive: Evidence of US monitoring 45 countries, regions exposed by Chinese cybersecurity experts for the 1st time
An elite hacking group under the US National Security Agency (NSA) was found to have been creating an advanced and covert backdoor which has been used to monitor 45 countries and regions for over a decade, the Global Times learned from a Beijing-based cybersecurity lab exclusively on Wednesday.
Experts from Qi An Pangu lab said on Wednesday they have declassified the full technical details and organizational links of "Telescreen" (Bvp47), a top-of-the-line backdoor created by Equation - an elite hacking group affiliated with the NSA. This is the first time that Chinese cybersecurity experts have publicly exposed the complete chain of technical evidence about the advanced persistent threat (APT) attack launched by Equation. - More - RE: Exclusive: Evidence of US monitoring 45 countries, regions - superadmin - 03-15-2022 Exclusive: China captures powerful US NSA cyberspy tool
[/align
[align=left]China captured a spy tool deployed by the US National Security Agency, which is capable of lurking in a victim's computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of users' information, according to a report the Global Times obtained from the National Computer Virus Emergency Response Center exclusively on Monday. According to the report, the Trojan horse, "NOPEN," is a remote control tool for Unix/Linux computer systems. It is mainly used for stealing files, accessing systems, redirecting network communication, and viewing a target device's information. Through technical analysis, the center believes that the "NOPEN" Trojan horse is characterized by complex technology, comprehensive functions and strong concealment, which can fit a variety of processor architectures and operating systems. It can also collaborate with other cyber weapons and is a typical tool used for cyber espionage. - More - RE: Exclusive: Evidence of US monitoring 45 countries, regions - studstocking - 10-19-2023 Computer software is a dynamic and ever-evolving field, with new developments and updates constantly emerging. The software you use can range from simple apps on your smartphone to complex operating systems and software used in businesses and industries worldwide. Effective software development and management are crucial for the functioning of modern technology. Thank you. |