inf.news
Open in
urlscan Pro
188.114.97.3
Public Scan
URL:
https://inf.news/en/world/fefc64819eccf25a1dda9eef045446eb.html
Submission: On April 20 via manual from AU — Scanned from NL
Submission: On April 20 via manual from AU — Scanned from NL
Form analysis
1 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
iNEWS * World * Sport * Entertainment * Tech * Digital * Economy * Military * Auto * Game 1. Home 2. World WHAT IS THE ORIGIN OF THE APT-C-39 ORGANIZATION MENTIONED BY ZHAO LIJIAN?SECRETS OF THE CIA'S CYBER ATTACKS 2023-04-20 16:35 HKT ADVERTISEMENT At the regular press conference of the Ministry of Foreign Affairs on the 19th, the spokesperson Zhao Lijian mentioned an APT-C-39 cyber attack organization affiliated with the CIA. This organization can be said to be the most evil hacker organization on the planet. It has carried out cyber attacks on China for 11 years. What is the background of this organization? U.S. cyber spies are pervasive, not only targeting opponents, but also allies, and possibly even your mobile phones. How bottomless is the US cyber espionage? Where did the APT-C-39 cyber attack organization come from? APT is the abbreviation of "advanced long-term threat" in English. APT technology comprehensively uses all available hacking methods, not only network attacks, but also combined with offline spy infiltration behavior, which is recognized as the most harmful hacking behavior. China is the main victim country of APT attacks. APT-C-39 was first coded and named by the network security company Qihoo 360 in a report released in March 2020. Among them, C indicates that the target of the attack is China, and 39 means that this organization is the 39th APT hacker group that was discovered by the company against China. The report pointed out that APT attacks against China are mainly concentrated in economically developed areas such as Beijing, the Pearl River Delta and the Yangtze River Delta. Taking the victimization situation in China's aerospace scientific research field as an example, APT-C-39 has carried out long-term "targeted strikes" on system developers of relevant core institutions. For example, using international conferences as a cover, sending emails with Trojan horses to researchers, or gifting USB flash drives with cyber attack weapons, after a while, the electronic devices around the researchers formed a hacker network, and they kept stealing intelligence for many years. . Analysis shows that the technical characteristics of APT-C-39's attacks are highly regular, which shows that there is a strict organizational background behind it, and it is most likely a national-level hacker organization to commit the crime. In addition, the attacks launched by APT-C-39 are coordinated with Eastern Time as the base axis, so its "mastermind" is located in this time zone. It is worth noting that Virginia, where the CIA headquarters is located, uses Eastern Time. The CIA's hacking weapon against China—"Qianlong 7" Related intelligence analysis also concluded that the cyber weapon used in the attack was consistent with the "Vault 7" announced by "WikiLeaks". In 2017, "WikiLeaks" published 8,176 documents copied from the Cyber Intelligence Center of the CIA, which contained information about the "Qinglong 7" that was regarded as a "core weapon" by the CIA. This information was provided to the "WikiLeaks" website by Joshua Adam Schulte, the head of science and technology intelligence at the CIA's Covert Operations (NCS) at the time. He directly participated in the development of the cyber weapon "Vault 7" (Vault 7) against China's attacks. So far, the chain of evidence directly related to APT-C-39 and the CIA has been quite complete. In addition, there is evidence that some of the attack weapons used by APT-C-39 were developed by the National Security Agency, showing that there is a higher level of coordination behind it. ADVERTISEMENT "Qinglong 7" is a hacker weapon project created by the CIA for China. It contains a variety of spyware and is known as the world's largest cyber spy weapon arsenal. "Qinglong 7" can turn any electronic device into a monitoring tool, including computers, smartphones, game consoles, routers and smart TVs, and even cars, trucks and airplanes. There are also reports that APT-C-39 has also been “shared” by the United States with NATO allies, which explains why the “Overview of China's Internet Cyber Security Situation in 2020” released in May shows that the three NATO member states The United States, the Netherlands, and Germany are among the top three countries that control the number of computers in China. ADVERTISEMENT NATO allies are also targets of U.S. cyber theft It is worth noting that although NATO has followed the US government to hype the so-called Chinese hacker issue this time, NATO allies are also the key targets of US cyber theft. The biggest victim is Germany, which is not very "obedient" in the eyes of the United States and often emphasizes "European strategic autonomy." The German "Bild" reported in 2013 that at that time the German Federal Intelligence Agency discovered that the United States had "completely monitored" German politicians for "several years." The report pointed out that after the end of the Cold War, the United States was very worried about its allies betraying itself and targeted its allies with the "echelon" project originally used to monitor the Soviet Union and Eastern European countries. But at the time, Merkel denied it and told the media that she had not been monitored. ADVERTISEMENT But the United States has never stopped monitoring Merkel. In 2016, "WikiLeaks" published documents confirming that Merkel was indeed on the US's key monitoring list. On May 30 this year, the Danish Broadcasting Corporation exposed the Danish Defense Intelligence Agency's "Operation Dunhammer" report. The report confirmed that U.S. intelligence agencies conducted long-term monitoring of dignitaries in France, Germany, Sweden, and Norway through Danish communication cables, including Merkel. The report also pointed out the way of monitoring: Denmark is located in the main traffic road in Northern Europe, and many communication optical cables land here. Therefore, Denmark is a data information hub in Europe. In the last century, the Danish Power Grid Corporation initiated the construction of a smart grid, and also invited US companies to participate. The US spy equipment penetrated into the cable communication computer room through the Danish power grid. In addition, historically, US spies used special submersibles to install information interceptors on submarine optical cables to steal Soviet intelligence. Through these interception devices, the United States can obtain everything from phone calls to web browsing records, as well as financial, government, and military data. Taking the assassination of the senior Iranian general Soleimani by the US military last year as an example, the US military used an intelligence analysis system called RT-RG to process Soleimani-related optical fiber, electromagnetic waves, and network information, and constructed "all-seeing and all-knowing" intelligence. By monitoring the network, the best time to assassinate can be determined within a few seconds, and the decision to take off the drone can be made. U.S. intelligence agencies control commercial companies ADVERTISEMENT US intelligence agencies also directly control well-known European commercial companies. In February last year, German TV 2 exposed the "Swiss Encryption Machine" incident. The CIA acquired the Swiss encryption equipment manufacturer Crypto AG from the 1950s and implanted the CIA in the products of this famous company. With a dedicated "backdoor" program, the CIA can decrypt the core secrets of these countries "at any time." German TV Station 2 believes that almost all countries in the world except China and the Soviet Union have used the company's products, which also explains some outstanding spy cases in the last century, involving countries such as Iran, Libya, and Egypt. It is worth pointing out that Iran is a key target of US cyber attacks, and European companies have once again become the white gloves of US intelligence services. The "Stuxnet" virus is the most destructive super cyber weapon known in the world. It has infected more than 60% of the computers in Iran. It is worth noting that among ordinary computers, the "Stuxnet" virus does not It will not happen, because it attacks the industrial control system used by important infrastructure, specifically the SCADA data acquisition and monitoring system of Germany's Siemens. After studying the "Stuxnet" virus, Eric Byres, an engineer in the troubleshooting department of Siemens, pointed out that it can take over the control of Siemens equipment, causing "self-destruction", and then implanting false codes to cover up Failure, and send a "normal operation" signal to the central control system, it will be too late by the time the damage is discovered. In 2008, Iran's uranium enrichment facility suffered unidentified damage. It was not until two years later that a cybersecurity company reported the existence of the "Stuxnet" virus. However, more than 1,000 centrifuges at Iran's Natanz uranium enrichment facility have been completely scrapped. Caused the Bushehr nuclear power plant to postpone power generation. In April this year, the uranium centrifuge in Natanz was damaged again. ADVERTISEMENT Cyber security experts pointed out that these data seem to be "useless", but in fact, after the RT-RG's intelligence analysis system is processed, everyone has "nowhere to hide." The recent exposure of the "Pegasus" mobile phone spy software developed by Israel's NSO has amplified the user's network security risks. "Pegasus" can turn on the camera, microphone and GPS without the user's awareness, and obtain any information in the phone. The list of "Pegasus" victims currently compiled exceeds 50,000, all of whom are members of the royal family, dignitaries, journalists, or parties to important events. The French newspaper Le Monde revealed that the country's President Macron is on this list, as are Chinese diplomats in India. A reporter from The New York Times confirmed that Anita Dunn, a senior adviser to the President of the United States, has long accepted "consulting fees" from the Israeli NSO company, the developer of the "Pegasus". This confirms that there is an ulterior motive between the White House and the "Pegasus". "Inextricably linked." * * * Zonnepaneel Experts Nieuwe ontdekking over zonnepanelen zorgt voor prijsdoorbraakZonnepaneel Experts| SponsoredSponsored Undo Flexojoint Mensen met heup- en kniepijn moeten dit wetenFlexojoint| SponsoredSponsored Undo Duurzaamheidsvergelijker Wat kosten zonnepanelen in 2023?Verdien je zonnepanelen binnen 4 jaar terugDuurzaamheidsvergelijker| SponsoredSponsored Undo Afvoer- en leidingreiniging | Zoek Advertenties Hoe een direct verstopte doucheafvoer te reinigen? De resultaten zullen u verrassen!Vanaf nu bespaart u tijd en geld op dure loodgietersrekeningen! Krachtige en veilige formule werkt onmiddellijk om haar, vet en andere hardnekkige klompen op te lossen. Geen agressieve chemicaliën. Herstel de stroom van uw afvoer vandaag nog!Afvoer- en leidingreiniging | Zoek Advertenties| SponsoredSponsored Undo Afvoer Schoonmaken | Zoek Advertenties Met de methode maak je de afvoerpijp eenvoudig schoon!Afvoer Schoonmaken | Zoek Advertenties| SponsoredSponsored Undo Slimming Gummies Nederlandse gewichtsverlies uitvinding laat experts sprakeloosOntdek het Geheim van Gemakkelijk Gewichtsverlies: De Verbluffende Nederlandse Uitvinding waar Deskundigen over Praten!Slimming Gummies| SponsoredSponsored Undo Landelijk Energieloket Energierekening flink omlaag door deze simpele trucLandelijk Energieloket| SponsoredSponsored Undo Afvoer Reinigen | Zoek Advertenties Een verstopte afvoer is verleden tijd, dit kan u verbazenAfvoer Reinigen | Zoek Advertenties| SponsoredSponsored Undo Landelijk Energieloket Energierekening flink omlaag door deze simpele truc.Landelijk Energieloket| SponsoredSponsored Undo ZE 45 plussers nemen deze vitamines om hun geheugen in stad te houdenZE| SponsoredSponsored Undo × search Trending * Jiang Mengjie was secretly photographed under the skirt and blackmailed to "ruin the rest... 18 hours ago * Xu Jiao posted on Weibo to show her fitness results, and she generously showed her peach b... 6 days ago * Tan Yuanyuan got married in the United States. The groom is a doctor of medicine. He once... 6 days ago * The giant panda "Fubao" in South Korea successfully renewed its contract! Grandpa Jiang cr... 5 days ago ADVERTISEMENT * Entertainment Comments: Xiao Zhan, Di Lieba, Yu Shuxin, Zheng Yecheng, Tian Xiwei, Feng Xi... 6 days ago * The private life scandal of the "uncle circle male god" was exposed, cheating on a rich wo... 6 days ago * Carina Lau, Chaoqiong Michelle Yeoh, and Lin Qingxia have four beauties in the same frame... 5 days ago * Conan and Haibara Ai kiss three times! Detective Conan Black Iron's fish movie released, s... 6 days ago ADVERTISEMENT * America doesn't have us! U.S. media: The UAE is negotiating a large arms deal with China t... 7 days ago * India will get B-1B strategic bomber? The performance of the H-6K is not as good as that o... 7 days ago * A 61-year-old Japanese woman fell in love with fresh meat, and the man was 7 years younger... 6 days ago * Entertainment Breaking News: Wang Yibo, Yang Zi, Yang Yang, Jin Chen, Chen Feiyu, Peng Yuc... 6 days ago * Armenia hung up Putin's phone and exchanged fire with Azerbaijan again, at least 7 people... 6 days ago * Macron has learned from China, ignoring the threat of the United States, and visiting abro... 6 days ago * "Till The End Of The Moon" Pian Ran's most regrettable? The little fox demon in red is stu... 6 days ago * China and Russia join hands to shine the sword! The United States issued a threat of war... 8 hours ago * Till The End Of The Moon: Mingye never imagined that Sangjiu, which he has been obsessed w... 6 days ago * Regrets of the People's Liberation Army's abandonment of the Tornado fighter: 20 billion U... 6 days ago * Saudi-Iran intelligence reconciliation rumors: unreliable, but it makes the United States... 5 days ago * More and more people don't buy water heaters at home, and now they are popular to replace... 3 days ago ©2023 iNEWS. ALL RIGHTS RESERVED. privacy | terms | contact us 在你离开之前能够看到这些优质的内容 继续阅读 相差40歲爺孫戀現狀,林坤城出現狀況,林靖恩身懷六甲無人照顧自古以來我國就有著「門當戶對」的說法,這裡的門當戶對不僅僅指的是兩人的家庭背景要相當,更加代表了兩個人在年紀和性格等當面要相互匹配,雖然現在人們的思想逐漸開明了起Inf News Group 3 Undo 爺孫戀造人成功!李坤城的財產真的能夠養活林靖恩和孩子?前言:愛情就是一道複雜的命題,我們為此困惑,為此興奮,讓自己變得不像自己,這種情感的魔力讓人甘之如飴,瘋狂獲取。之前,82歲時的楊振寧宣布與28歲的廣東外語外貿大學Inf News Group 3 Undo Another actress revealed that her 14-year-old divorced husband had an affair with her mother and publicly severed the relationship between mother and daughterIn the entertainment industry, anything can happen, and there are endless melons every day. Recently, Taiwanese model Jiang Ping suddenly reported the inside stInf News Group 3 Undo 日本AV男優數量缺少 ,部分工作超負荷據日本媒體報導及行業調查數據綜合顯示,日本職業男女優人數比例約為70:10000。也就是說,職業男優人數遠遠少於女優,這也是大家看來看去就那麼幾個老面孔,例如國內網友Inf News Group 3 Undo ' ' ' ' ' ' 《監獄學園》有第二季嗎?《監獄學園》有第二季嗎?小李市民侃娛樂發布時間:2022-04-0512:04學者,影視領域創作者,活力創作者日本電視劇《監獄學園》沒有第二季,這部電視劇是根據日本漫畫家平本彰Inf News Undo Britain's ugliest princess Beatrice: Owl's 'sister', willing to be the third sister to marry a scumbagAlthough she has the same name as the woman in Monaco who is strong enough to hang all the princesses in Europe, this princess with eyes like copper bells is thInf News Undo Britain's ugliest princess, Beatrice, has big eyes and buck teeth and is jealous of Kate.To say who is the worst princess in the UK today, it is the eldest princess and sister of Queen Elizabeth II's second son Andrew's family (below).The princessesInf News Undo Zhu Yin and her husband had a sexless marriage for 5 years, but she loved the star and was abandoned by Aaron Kwok. What did she experience?In the entertainment industry, every celebrity is privately like us ordinary people, they also have to face marriage and childbirth. But before the media, theyInf News Undo Zonnepaneel Experts Nieuwe ontdekking over zonnepanelen zorgt voor prijsdoorbraakZonnepaneel Experts| SponsoredSponsored Undo Flexojoint Mensen met heup- en kniepijn moeten dit wetenFlexojoint| SponsoredSponsored Undo Health expert Lin Haifeng passed away at the age of 51, the doctor confessed: 3 ways to maintain healthInf News Undo Is Camilla really ugly?A set of out-of-print old photos tell you that she is actually really beautifulInf News Undo Duurzaamheidsvergelijker Wat kosten zonnepanelen in 2023?Duurzaamheidsvergelijker| SponsoredSponsored Undo Afvoer- en leidingreiniging | Zoek Advertenties Hoe een direct verstopte doucheafvoer te reinigen? De resultaten zullen u verrassen!Afvoer- en leidingreiniging | Zoek Advertenties| SponsoredSponsored Undo Yang Yang's scandal continues to spread, but the only girlfriend he loves is Li QinMale star Yang Yang is known as the national husband for the playInf News Undo Yang Yang was revealed to be dating Zhao Lusi and met his parents on the first day of the new year. Zhao Lusi made two words to refute the rumorOn March 7, actress Zhao Lusifang posted a document denying her relationship with Yang Yang. The related account posted the wordInf News Undo