美国中央情报局网络攻击他国调查报告发布

您所在的位置:网站首页 springboard 插件 美国中央情报局网络攻击他国调查报告发布

美国中央情报局网络攻击他国调查报告发布

2023-05-08 06:26| 来源: 网络整理| 查看: 265

国家计算机病毒应急处理中心和360公司今天(4日)联合发布了一份调查报告,揭秘了美国中央情报局利用网络攻击他国的相关情况,披露部分发生在中国和其他国家的网络安全典型案事件的具体过程,全面深入分析美国中央情报局的网络攻击窃密和相关现实危害活动,以及其对美国成为“黑客帝国”所做的贡献。此次报告发布将为遍布全球的网络攻击受害者提供参考和建议。

美国中央情报局(CIA),是美国联邦政府主要情报机构之一,长期以来,美国中央情报局在世界各地秘密实施“和平演变”和“颜色革命”,持续进行间谍窃密活动。

2020年,360公司独立发现一个从未被外界曝光的网络攻击组织,该组织使用与美国中央情报局相关联的网络武器工具,针对中国和其他国家受害目标实施网络攻击,攻击活动最早可以追溯到2011年,相关攻击一直延续至今。被攻击目标涉及各国重要信息基础设施、航空航天、科研机构、石油石化、大型互联网公司以及政府机构等诸多方面。

由国家计算机病毒应急处理中心和360公司联合成立的调查组发现在规模庞大的全球性网络攻击行动中,美国中央情报局大量使用“零日”漏洞,其中包括一大批至今未被公开披露的后门和漏洞(部分功能已得到验证),在世界各地建立“僵尸”网络和攻击跳板网络,针对网络服务器、网络终端、交换机和路由器,以及数量众多的工业控制设备分阶段实施攻击入侵行动。

在针对中国境内多起典型网络攻击事件的调查过程中,联合调查组从受害单位信息网络中捕获并成功提取了一大批与美国中央情报局紧密关联的木马程序、功能插件和攻击平台样本。这些相关网络武器都进行了极其严格的规范化、流程化和专业化的软件工程管理,而目前只有美国中央情报局严格遵守这些标准和规范开发网络攻击武器。

通过实证分析,联合调查组发现美国中央情报局的网络武器使用了极其严格的间谍技术规范,各种攻击手法前后呼应、环环相扣,现已覆盖全球几乎所有互联网和物联网资产,可以随时随地控制别国网络,盗取别国重要、敏感数据,而这无疑需要大量的财力、技术和人力资源支撑,美国式的网络霸权可见一斑,“黑客帝国”实至名归。

目前,联合调查组已将相关情况提供给我国受害单位所在辖区的公安机关。

The Chinese authorities released a report on Thursday to reveal the cyberattacks conducted by U.S. intelligent agency toward other countries over the years.

China's National Computer Virus Emergency Response Center and Chinese cybersecurity company Qihoo 360 Technology Co. Ltd. jointly released an investigation report on the U.S. Central Intelligence Agency's (CIA) cyberattacks against other countries and the consequences it led.

The cybersecurity firm Qihoo 360 discovered an unknown cyberattack organization in 2020 which carried out a slew of cyberattacks toward China and other countries by utilizing cyber tools related to CIA.

Such cyberattacks can be traced back to the year of 2011, and continue to this day. The targets of such espionage actions expand to fields such as countries' key information infrastructure, aerospace sector, scientific research institutes, petroleum industry, tech companies as well as government agencies.

The report unveils that the CIA took advantages of zero-day vulnerability, including a number of backdoors and vulnerabilities that haven't been disclosed to the public. This was done to set up "zombie" networks to initiate springboard attacks by stages, targeting web servers, terminals, routers, as well as industrial control devices. The zero-day vulnerability are software loopholes that are discovered by attackers before the vendor has become aware of them.

In the joint investigation, the team captured a plethora of malware such as Trojan programs and plug-ins related to the CIA. All the cyberattacking weapons were strictly standardized, processed and underwent professional software engineering management, which only the CIA abides by these standards and specifications to develop cyberattack weapons.

The investigation also found that the CIA's cyberattacks cover all networks which enable the CIA to easily steal sensitive data of other countries at any time.

海量资讯、精准解读,尽在新浪财经APP


【本文地址】


今日新闻


推荐新闻


CopyRight 2018-2019 办公设备维修网 版权所有 豫ICP备15022753号-3