inf.news Open in urlscan Pro
188.114.97.3  Public Scan

URL: https://inf.news/en/world/fefc64819eccf25a1dda9eef045446eb.html
Submission: On April 20 via manual from AU — Scanned from NL

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

iNEWS
 * World
 * Sport
 * Entertainment
 * Tech
 * Digital
 * Economy
 * Military
 * Auto
 * Game


 1. Home
 2. World


WHAT IS THE ORIGIN OF THE APT-C-39 ORGANIZATION MENTIONED BY ZHAO LIJIAN?SECRETS
OF THE CIA'S CYBER ATTACKS

2023-04-20 16:35 HKT

ADVERTISEMENT



At the regular press conference of the Ministry of Foreign Affairs on the 19th,
the spokesperson Zhao Lijian mentioned an APT-C-39 cyber attack organization
affiliated with the CIA. This organization can be said to be the most evil
hacker organization on the planet. It has carried out cyber attacks on China for
11 years. What is the background of this organization? U.S. cyber spies are
pervasive, not only targeting opponents, but also allies, and possibly even your
mobile phones. How bottomless is the US cyber espionage?






Where did the APT-C-39 cyber attack organization come from?

APT is the abbreviation of "advanced long-term threat" in English. APT
technology comprehensively uses all available hacking methods, not only network
attacks, but also combined with offline spy infiltration behavior, which is
recognized as the most harmful hacking behavior. China is the main victim
country of APT attacks. APT-C-39 was first coded and named by the network
security company Qihoo 360 in a report released in March 2020. Among them, C
indicates that the target of the attack is China, and 39 means that this
organization is the 39th APT hacker group that was discovered by the company
against China. The report pointed out that APT attacks against China are mainly
concentrated in economically developed areas such as Beijing, the Pearl River
Delta and the Yangtze River Delta.




Taking the victimization situation in China's aerospace scientific research
field as an example, APT-C-39 has carried out long-term "targeted strikes" on
system developers of relevant core institutions. For example, using
international conferences as a cover, sending emails with Trojan horses to
researchers, or gifting USB flash drives with cyber attack weapons, after a
while, the electronic devices around the researchers formed a hacker network,
and they kept stealing intelligence for many years. .

Analysis shows that the technical characteristics of APT-C-39's attacks are
highly regular, which shows that there is a strict organizational background
behind it, and it is most likely a national-level hacker organization to commit
the crime. In addition, the attacks launched by APT-C-39 are coordinated with
Eastern Time as the base axis, so its "mastermind" is located in this time zone.
It is worth noting that Virginia, where the CIA headquarters is located, uses
Eastern Time.








The CIA's hacking weapon against China—"Qianlong 7"



Related intelligence analysis also concluded that the cyber weapon used in the
attack was consistent with the "Vault 7" announced by "WikiLeaks". In 2017,
"WikiLeaks" published 8,176 documents copied from the Cyber Intelligence Center
of the CIA, which contained information about the "Qinglong 7" that was regarded
as a "core weapon" by the CIA. This information was provided to the "WikiLeaks"
website by Joshua Adam Schulte, the head of science and technology intelligence
at the CIA's Covert Operations (NCS) at the time. He directly participated in
the development of the cyber weapon "Vault 7" (Vault 7) against China's attacks.
So far, the chain of evidence directly related to APT-C-39 and the CIA has been
quite complete. In addition, there is evidence that some of the attack weapons
used by APT-C-39 were developed by the National Security Agency, showing that
there is a higher level of coordination behind it.



ADVERTISEMENT



"Qinglong 7" is a hacker weapon project created by the CIA for China. It
contains a variety of spyware and is known as the world's largest cyber spy
weapon arsenal. "Qinglong 7" can turn any electronic device into a monitoring
tool, including computers, smartphones, game consoles, routers and smart TVs,
and even cars, trucks and airplanes.







There are also reports that APT-C-39 has also been “shared” by the United States
with NATO allies, which explains why the “Overview of China's Internet Cyber
Security Situation in 2020” released in May shows that the three NATO member
states The United States, the Netherlands, and Germany are among the top three
countries that control the number of computers in China.

ADVERTISEMENT



NATO allies are also targets of U.S. cyber theft

It is worth noting that although NATO has followed the US government to hype the
so-called Chinese hacker issue this time, NATO allies are also the key targets
of US cyber theft. The biggest victim is Germany, which is not very "obedient"
in the eyes of the United States and often emphasizes "European strategic
autonomy." The German "Bild" reported in 2013 that at that time the German
Federal Intelligence Agency discovered that the United States had "completely
monitored" German politicians for "several years." The report pointed out that
after the end of the Cold War, the United States was very worried about its
allies betraying itself and targeted its allies with the "echelon" project
originally used to monitor the Soviet Union and Eastern European countries. But
at the time, Merkel denied it and told the media that she had not been
monitored.



ADVERTISEMENT



But the United States has never stopped monitoring Merkel. In 2016, "WikiLeaks"
published documents confirming that Merkel was indeed on the US's key monitoring
list. On May 30 this year, the Danish Broadcasting Corporation exposed the
Danish Defense Intelligence Agency's "Operation Dunhammer" report. The report
confirmed that U.S. intelligence agencies conducted long-term monitoring of
dignitaries in France, Germany, Sweden, and Norway through Danish communication
cables, including Merkel. The report also pointed out the way of monitoring:
Denmark is located in the main traffic road in Northern Europe, and many
communication optical cables land here. Therefore, Denmark is a data information
hub in Europe. In the last century, the Danish Power Grid Corporation initiated
the construction of a smart grid, and also invited US companies to participate.
The US spy equipment penetrated into the cable communication computer room
through the Danish power grid. In addition, historically, US spies used special
submersibles to install information interceptors on submarine optical cables to
steal Soviet intelligence.





Through these interception devices, the United States can obtain everything from
phone calls to web browsing records, as well as financial, government, and
military data. Taking the assassination of the senior Iranian general Soleimani
by the US military last year as an example, the US military used an intelligence
analysis system called RT-RG to process Soleimani-related optical fiber,
electromagnetic waves, and network information, and constructed "all-seeing and
all-knowing" intelligence. By monitoring the network, the best time to
assassinate can be determined within a few seconds, and the decision to take off
the drone can be made.

U.S. intelligence agencies control commercial companies

ADVERTISEMENT



US intelligence agencies also directly control well-known European commercial
companies. In February last year, German TV 2 exposed the "Swiss Encryption
Machine" incident. The CIA acquired the Swiss encryption equipment manufacturer
Crypto AG from the 1950s and implanted the CIA in the products of this famous
company. With a dedicated "backdoor" program, the CIA can decrypt the core
secrets of these countries "at any time." German TV Station 2 believes that
almost all countries in the world except China and the Soviet Union have used
the company's products, which also explains some outstanding spy cases in the
last century, involving countries such as Iran, Libya, and Egypt.





It is worth pointing out that Iran is a key target of US cyber attacks, and
European companies have once again become the white gloves of US intelligence
services. The "Stuxnet" virus is the most destructive super cyber weapon known
in the world. It has infected more than 60% of the computers in Iran. It is
worth noting that among ordinary computers, the "Stuxnet" virus does not It will
not happen, because it attacks the industrial control system used by important
infrastructure, specifically the SCADA data acquisition and monitoring system of
Germany's Siemens.

After studying the "Stuxnet" virus, Eric Byres, an engineer in the
troubleshooting department of Siemens, pointed out that it can take over the
control of Siemens equipment, causing "self-destruction", and then implanting
false codes to cover up Failure, and send a "normal operation" signal to the
central control system, it will be too late by the time the damage is
discovered. In 2008, Iran's uranium enrichment facility suffered unidentified
damage. It was not until two years later that a cybersecurity company reported
the existence of the "Stuxnet" virus. However, more than 1,000 centrifuges at
Iran's Natanz uranium enrichment facility have been completely scrapped. Caused
the Bushehr nuclear power plant to postpone power generation. In April this
year, the uranium centrifuge in Natanz was damaged again.

ADVERTISEMENT







Cyber security experts pointed out that these data seem to be "useless", but in
fact, after the RT-RG's intelligence analysis system is processed, everyone has
"nowhere to hide." The recent exposure of the "Pegasus" mobile phone spy
software developed by Israel's NSO has amplified the user's network security
risks. "Pegasus" can turn on the camera, microphone and GPS without the user's
awareness, and obtain any information in the phone. The list of "Pegasus"
victims currently compiled exceeds 50,000, all of whom are members of the royal
family, dignitaries, journalists, or parties to important events. The French
newspaper Le Monde revealed that the country's President Macron is on this list,
as are Chinese diplomats in India. A reporter from The New York Times confirmed
that Anita Dunn, a senior adviser to the President of the United States, has
long accepted "consulting fees" from the Israeli NSO company, the developer of
the "Pegasus". This confirms that there is an ulterior motive between the White
House and the "Pegasus". "Inextricably linked."



 * 
 * 
 * 



Zonnepaneel Experts

Nieuwe ontdekking over zonnepanelen zorgt voor prijsdoorbraakZonnepaneel
Experts|
SponsoredSponsored


Undo
Flexojoint

Mensen met heup- en kniepijn moeten dit wetenFlexojoint|
SponsoredSponsored


Undo
Duurzaamheidsvergelijker

Wat kosten zonnepanelen in 2023?Verdien je zonnepanelen binnen 4 jaar
terugDuurzaamheidsvergelijker|
SponsoredSponsored


Undo

Afvoer- en leidingreiniging | Zoek Advertenties


Hoe een direct verstopte doucheafvoer te reinigen? De resultaten zullen u
verrassen!Vanaf nu bespaart u tijd en geld op dure loodgietersrekeningen!
Krachtige en veilige formule werkt onmiddellijk om haar, vet en andere
hardnekkige klompen op te lossen. Geen agressieve chemicaliën. Herstel de stroom
van uw afvoer vandaag nog!Afvoer- en leidingreiniging | Zoek Advertenties|
SponsoredSponsored


Undo
Afvoer Schoonmaken | Zoek Advertenties

Met de methode maak je de afvoerpijp eenvoudig schoon!Afvoer Schoonmaken | Zoek
Advertenties|
SponsoredSponsored


Undo

Slimming Gummies

Nederlandse gewichtsverlies uitvinding laat experts sprakeloosOntdek het Geheim
van Gemakkelijk Gewichtsverlies: De Verbluffende Nederlandse Uitvinding waar
Deskundigen over Praten!Slimming Gummies|
SponsoredSponsored


Undo
Landelijk Energieloket

Energierekening flink omlaag door deze simpele trucLandelijk Energieloket|
SponsoredSponsored


Undo
Afvoer Reinigen | Zoek Advertenties

Een verstopte afvoer is verleden tijd, dit kan u verbazenAfvoer Reinigen | Zoek
Advertenties|
SponsoredSponsored


Undo

Landelijk Energieloket

Energierekening flink omlaag door deze simpele truc.Landelijk Energieloket|
SponsoredSponsored


Undo
ZE

45 plussers nemen deze vitamines om hun geheugen in stad te houdenZE|
SponsoredSponsored


Undo



×

search
 

Trending
 * Jiang Mengjie was secretly photographed under the skirt and blackmailed to
   "ruin the rest... 18 hours ago
 * Xu Jiao posted on Weibo to show her fitness results, and she generously
   showed her peach b... 6 days ago
 * Tan Yuanyuan got married in the United States. The groom is a doctor of
   medicine. He once... 6 days ago
 * The giant panda "Fubao" in South Korea successfully renewed its contract!
   Grandpa Jiang cr... 5 days ago

   ADVERTISEMENT
   
   
 * Entertainment Comments: Xiao Zhan, Di Lieba, Yu Shuxin, Zheng Yecheng, Tian
   Xiwei, Feng Xi... 6 days ago
 * The private life scandal of the "uncle circle male god" was exposed, cheating
   on a rich wo... 6 days ago
 * Carina Lau, Chaoqiong Michelle Yeoh, and Lin Qingxia have four beauties in
   the same frame... 5 days ago
 * Conan and Haibara Ai kiss three times! Detective Conan Black Iron's fish
   movie released, s... 6 days ago

   ADVERTISEMENT
   
   
 * America doesn't have us! U.S. media: The UAE is negotiating a large arms deal
   with China t... 7 days ago
 * India will get B-1B strategic bomber? The performance of the H-6K is not as
   good as that o... 7 days ago
 * A 61-year-old Japanese woman fell in love with fresh meat, and the man was 7
   years younger... 6 days ago
 * Entertainment Breaking News: Wang Yibo, Yang Zi, Yang Yang, Jin Chen, Chen
   Feiyu, Peng Yuc... 6 days ago
 * Armenia hung up Putin's phone and exchanged fire with Azerbaijan again, at
   least 7 people... 6 days ago
 * Macron has learned from China, ignoring the threat of the United States, and
   visiting abro... 6 days ago
 * "Till The End Of The Moon" Pian Ran's most regrettable? The little fox demon
   in red is stu... 6 days ago
 * China and Russia join hands to shine the sword! The United States issued a
   threat of war... 8 hours ago
 * Till The End Of The Moon: Mingye never imagined that Sangjiu, which he has
   been obsessed w... 6 days ago
 * Regrets of the People's Liberation Army's abandonment of the Tornado fighter:
   20 billion U... 6 days ago
 * Saudi-Iran intelligence reconciliation rumors: unreliable, but it makes the
   United States... 5 days ago
 * More and more people don't buy water heaters at home, and now they are
   popular to replace... 3 days ago

©2023 iNEWS. ALL RIGHTS RESERVED.

privacy | terms | contact us






在你离开之前能够看到这些优质的内容


继续阅读


相差40歲爺孫戀現狀,林坤城出現狀況,林靖恩身懷六甲無人照顧自古以來我國就有著「門當戶對」的說法,這裡的門當戶對不僅僅指的是兩人的家庭背景要相當,更加代表了兩個人在年紀和性格等當面要相互匹配,雖然現在人們的思想逐漸開明了起Inf
News
Group 3


Undo

爺孫戀造人成功!李坤城的財產真的能夠養活林靖恩和孩子?前言:愛情就是一道複雜的命題,我們為此困惑,為此興奮,讓自己變得不像自己,這種情感的魔力讓人甘之如飴,瘋狂獲取。之前,82歲時的楊振寧宣布與28歲的廣東外語外貿大學Inf
News
Group 3


Undo

Another actress revealed that her 14-year-old divorced husband had an affair
with her mother and publicly severed the relationship between mother and
daughterIn the entertainment industry, anything can happen, and there are
endless melons every day. Recently, Taiwanese model Jiang Ping suddenly reported
the inside stInf News
Group 3


Undo

日本AV男優數量缺少
,部分工作超負荷據日本媒體報導及行業調查數據綜合顯示,日本職業男女優人數比例約為70:10000。也就是說,職業男優人數遠遠少於女優,這也是大家看來看去就那麼幾個老面孔,例如國內網友Inf
News
Group 3


Undo

' ' '
' ' '


《監獄學園》有第二季嗎?《監獄學園》有第二季嗎?小李市民侃娛樂發布時間:2022-04-0512:04學者,影視領域創作者,活力創作者日本電視劇《監獄學園》沒有第二季,這部電視劇是根據日本漫畫家平本彰Inf
News


Undo


Britain's ugliest princess Beatrice: Owl's 'sister', willing to be the third
sister to marry a scumbagAlthough she has the same name as the woman in Monaco
who is strong enough to hang all the princesses in Europe, this princess with
eyes like copper bells is thInf News


Undo

Britain's ugliest princess, Beatrice, has big eyes and buck teeth and is jealous
of Kate.To say who is the worst princess in the UK today, it is the eldest
princess and sister of Queen Elizabeth II's second son Andrew's family
(below).The princessesInf News


Undo

Zhu Yin and her husband had a sexless marriage for 5 years, but she loved the
star and was abandoned by Aaron Kwok. What did she experience?In the
entertainment industry, every celebrity is privately like us ordinary people,
they also have to face marriage and childbirth. But before the media, theyInf
News


Undo

Zonnepaneel Experts

Nieuwe ontdekking over zonnepanelen zorgt voor prijsdoorbraakZonnepaneel
Experts|
SponsoredSponsored


Undo
Flexojoint

Mensen met heup- en kniepijn moeten dit wetenFlexojoint|
SponsoredSponsored


Undo


Health expert Lin Haifeng passed away at the age of 51, the doctor confessed: 3
ways to maintain healthInf News


Undo

Is Camilla really ugly?A set of out-of-print old photos tell you that she is
actually really beautifulInf News


Undo

Duurzaamheidsvergelijker

Wat kosten zonnepanelen in 2023?Duurzaamheidsvergelijker|
SponsoredSponsored


Undo
Afvoer- en leidingreiniging | Zoek Advertenties


Hoe een direct verstopte doucheafvoer te reinigen? De resultaten zullen u
verrassen!Afvoer- en leidingreiniging | Zoek Advertenties|
SponsoredSponsored


Undo


Yang Yang's scandal continues to spread, but the only girlfriend he loves is Li
QinMale star Yang Yang is known as the national husband for the playInf News


Undo

Yang Yang was revealed to be dating Zhao Lusi and met his parents on the first
day of the new year. Zhao Lusi made two words to refute the rumorOn March 7,
actress Zhao Lusifang posted a document denying her relationship with Yang Yang.
The related account posted the wordInf News


Undo