Sunday, November 24, 2024
HomeCyber Security NewsChina Accuses the US of Hacking Huawei Servers Since 2009

China Accuses the US of Hacking Huawei Servers Since 2009

Published on

Huawei is known for its telecommunications equipment and consumer electronics, including smartphones, and the USA banned Huawei primarily due to national security concerns.

As the Chinese government may utilize Huawei’s technology for spying, the U.S. government claimed that the business constituted a security concern.

China recently acknowledged the NSA’s hacking of Huawei servers, a decade after the Snowden leak.

- Advertisement - SIEM as a Service

The Ministry of State Security report states that the NSA conducted repeated, systematic attacks to steal China’s important data through its TAO (Tailored Access Operations).

Huawei’s Servers Have been Hacked for Years

Since 2009, TAO, which is now Computer Network Operations, has hacked Huawei HQ servers and maintained surveillance.

TAO is the cyberwarfare intelligence-gathering unit of NSA, which is now known as Computer Network Operations, targeted Huawei’s sealed Shenzhen headquarters in documents revealed by Snowden in 2013.

Besides this, the Northwestern Polytechnical University’s hacking in September 2022 highlights China’s increased exposure to US cyber espionage, as per the ministry report.

The ministry’s report follows its identification of NSA operatives during a cyberattack on Northwestern Polytechnical University, with a pledge to eliminate all “digital spies” less than a week earlier.

The following report reveals the NSA’s extensive cyberattack capabilities and lists several weapons used for over a decade against multiple countries:-

“Uncovering the main despicable means of cyberattacks and secret theft by US intelligence agencies.”

The US government allegedly used the Foreign Intelligence Surveillance Act to compel businesses to unlock system back doors. It gave examples of access to location and data using X-Mode Social and Anomaly Six.

According to Snowden’s papers, the NSA targeted Huawei to obtain information on their equipment and keep tabs on executive communications.

The covert operation, referred to as Shotgiant, aimed at taking advantage of Huawei’s technological capabilities. The objective was to enable the National Security Agency (NSA) to tap into computer and phone networks through the equipment sold by Huawei to countries that steer clear of purchasing American products, as well as those who are allies of the United States.

NSA access to worldwide networks was the goal of Operation Shotgiant, which sought to take advantage of Huawei technology. It also looked into Huawei’s connections to the Chinese military, but the records offered no convincing proof.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...