• About
  • Advertise
  • Careers
  • Contact
Monday, March 20, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security Malware

Chinese hackers then used NSA’s hacking tools and technology to target American allies.

by Cyber360 News
November 11, 2019
in Malware
0
Chinese hackers then used NSA’s hacking tools and technology to target American allies.
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

Chinese hackers then used NSA’s hacking tools and technology to target American allies.

Symantec researchers have discovered that in 2016, Chinese intelligence managed to repurpose hacking tools used by the National Security Agency (NSA) and exploit them to attack American private firms and allies across the globe.

In the new report published by The New York Times, it is revealed that primary targets of Chinese intelligence operatives were located in Asia and Europe.

Researchers believe that the Chinese government didn’t steal the code for NSA’s hacking tools/technology but obtained it from an NSA attack launched against their systems even before the Shadow Brokers leak. Researchers wrote that it was similar to “a gunslinger who grabs an enemy’s rifle and starts blasting away.”

“Symantec has now found evidence that a cyber espionage group began using Equation Group tools in attacks at least a year prior to the Shadow Brokers leak,” the company wrote in its blog post.

The hacking tools were then repurposed by Chinese hackers who launched several attacks against wide-range of industries including educational institutions, scientific research organizations, and space, satellite, and nuclear propulsion technology makers.

Image credit: Symantec

“The stolen hacking tools included DoublePulsar backdoor, the FuzzBunch framework, and the EternalBlue, EternalSynergy, and EternalRomance.”

It is worth mentioning that these hacking tools were also leaked online by a group dubbed as the Shadow Brokers. One of the exploited hacking tools EternalBlue is currently being used by cyber criminals in several campaigns including in Beapy malware that has so far targeted thousands of businesses.

According to Symantec’s blog post, Chinese intelligence contractors are believed to have targeted US firms and allies in five countries, which include Hong Kong, Belgium, Vietnam, Luxembourg, and the Philippines. The hackers also attacked a mainstream telecommunication network that alone would have provided them access to tens of thousands of private conversations.

However, it must be noted that Symantec didn’t specifically name China but only identified that the hackers were the Buckeye group, also known as APT3. It is a term Symantec uses for hinting towards the involvement of the Chinese Ministry of State Security contractor that operated outside Guangzhou. In the same way, Symantec refers to hackers from the NSA as the Equation group.

Nevertheless, the company is still unclear how did the Buckeye group have access to these tools. Symantec’s security director Eric Chien told The New York Times that this is the first such case that they have identified.

“This is the first time we’ve seen a case — that people have long referenced in theory — of a group recovering unknown vulnerabilities and exploits used against them, and then using these exploits to attack others.”

Remember, in 2016, Shadow Brokers leaked a trove of data it stole from the NSA. The hacking group then started its monthly paid dump service to sell the leaked hacking tools to interested buyers and days later the same tools were used to spread the infamous and nasty WannaCry ransomware.

Did you enjoy reading this article? Like our page on Facebook and follow us on Twitter.

Cyber360 News

Cyber360 News

Next Post
The majority of the bots are located in Brazil and Peru but the number of victims is constantly increasing across diverse regions.

The majority of the bots are located in Brazil and Peru but the number of victims is constantly increasing across diverse regions.

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In