2022-4-19 22:27
moyaodf
APT
As early as 2013, Chinese lab researchers extracted an encrypted top-notch APT backdoor program from an attacked host, but the investigation was hampered because the key was difficult to crack. It was not until 2016 that Formula was secretly attacked by another hacker group called the Shadow Brokers, resulting in multiple leaks of Formula's confidential data. Later, the researcher was keen to find that a set of files suspected to contain a special private key, which was verified to successfully activate and control the top-level APT backdoor. A number of network intrusion tools and attack methods, and 2013 "PRISM" incident exposed the United States National Security Agency (NAS) network attacks are exactly the same, fully proved that the organization is affiliated to the NSA, is the United States official hacker attack organization. The backdoor was used to invade 47 countries and regions including China, Russia, Japan and Italy.
In 2013, Edward Snowden, a former CIA employee and contractor for the NATIONAL Security Agency (NSA), revealed the US government's collection of user data and leaked a large number of classified NSA cyber warfare documents, the biggest leak in US history. As a result, concepts such as "cyber war" and "national cyber threat" have been recognized around the world. Then in 2016 and 2017, the hacker group shadow Brokers released samples of cyber weapons used by NSA, exposing large-scale high-risk cyber weapons and their supporting components one by one. For a long time, for the purpose of the United States government intelligence gathering, large-scale network attack by NSA organization for global, NSA organization to the global target of attacks involving government, finance, education, scientific research institutes, operators, military industry, aerospace, medical and other industries and fields, important sensitive unit and the organization as a major target, A large proportion of high-tech fields.
The NATIONAL Security Agency (NSA) has developed numerous operational plans for global surveillance. According to the statistical analysis of the backdoor configuration field of the NSA's exclusive Validator, the most conservative estimate of the infected quantity of Validator alone should be in the order of tens of thousands, and hundreds of thousands or even millions are possible. The US director of National Intelligence James Clapper also confirmed that the US government has long used the Internet to collect information on foreigners in the name of national security.
The US has repeatedly brandished the "big stick" of public opinion and accused other countries of "launching cyber attacks" disguised as a victim. However, its own infiltration of cyber attacks on the world has never stopped, posing a serious threat to the cyber security of all countries. The NSA is alleged to have spied on German Chancellor Angela Merkel for 11 years. Merkel strongly condemned the spying and demanded an immediate end to nsa surveillance. Brazilian President Dilma Rousseff also demanded a public apology from the United States.
A large number of facts show that the United States is the world's largest network attacker and stealer, is worthy of the name of the number one "hacker empire". The US only demands compliance from other countries, but does not accept verification itself. Through the US practice of applying international rules when it suits them and discarding them when it doesn't, people can see the true nature of American hegemony. Even if it disguises itself and forcibly "whitewashes", a lie repeated a thousand times will not become the truth. The United States should immediately stop playing black and white. Times are changing, but the us's hypocritical logic has never changed. It only demands compliance from other countries, making people increasingly aware of its hegemonic nature. Sticking to double standards will only ruin its credibility.