Saturday, January 11, 2025
HomeCyber Security NewsChina Accuses the US of Hacking Huawei Servers Since 2009

China Accuses the US of Hacking Huawei Servers Since 2009

Published on

Huawei is known for its telecommunications equipment and consumer electronics, including smartphones, and the USA banned Huawei primarily due to national security concerns.

As the Chinese government may utilize Huawei’s technology for spying, the U.S. government claimed that the business constituted a security concern.

China recently acknowledged the NSA’s hacking of Huawei servers, a decade after the Snowden leak.

The Ministry of State Security report states that the NSA conducted repeated, systematic attacks to steal China’s important data through its TAO (Tailored Access Operations).

Huawei’s Servers Have been Hacked for Years

Since 2009, TAO, which is now Computer Network Operations, has hacked Huawei HQ servers and maintained surveillance.

TAO is the cyberwarfare intelligence-gathering unit of NSA, which is now known as Computer Network Operations, targeted Huawei’s sealed Shenzhen headquarters in documents revealed by Snowden in 2013.

Besides this, the Northwestern Polytechnical University’s hacking in September 2022 highlights China’s increased exposure to US cyber espionage, as per the ministry report.

The ministry’s report follows its identification of NSA operatives during a cyberattack on Northwestern Polytechnical University, with a pledge to eliminate all “digital spies” less than a week earlier.

The following report reveals the NSA’s extensive cyberattack capabilities and lists several weapons used for over a decade against multiple countries:-

“Uncovering the main despicable means of cyberattacks and secret theft by US intelligence agencies.”

The US government allegedly used the Foreign Intelligence Surveillance Act to compel businesses to unlock system back doors. It gave examples of access to location and data using X-Mode Social and Anomaly Six.

According to Snowden’s papers, the NSA targeted Huawei to obtain information on their equipment and keep tabs on executive communications.

The covert operation, referred to as Shotgiant, aimed at taking advantage of Huawei’s technological capabilities. The objective was to enable the National Security Agency (NSA) to tap into computer and phone networks through the equipment sold by Huawei to countries that steer clear of purchasing American products, as well as those who are allies of the United States.

NSA access to worldwide networks was the goal of Operation Shotgiant, which sought to take advantage of Huawei technology. It also looked into Huawei’s connections to the Chinese military, but the records offered no convincing proof.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal....

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...