China Accuses the US of Hacking Huawei Servers Since 2009

Huawei is known for its telecommunications equipment and consumer electronics, including smartphones, and the USA banned Huawei primarily due to national security concerns.

As the Chinese government may utilize Huawei’s technology for spying, the U.S. government claimed that the business constituted a security concern.

China recently acknowledged the NSA’s hacking of Huawei servers, a decade after the Snowden leak.

The Ministry of State Security report states that the NSA conducted repeated, systematic attacks to steal China’s important data through its TAO (Tailored Access Operations).

Huawei’s Servers Have been Hacked for Years

Since 2009, TAO, which is now Computer Network Operations, has hacked Huawei HQ servers and maintained surveillance.

TAO is the cyberwarfare intelligence-gathering unit of NSA, which is now known as Computer Network Operations, targeted Huawei’s sealed Shenzhen headquarters in documents revealed by Snowden in 2013.

Besides this, the Northwestern Polytechnical University’s hacking in September 2022 highlights China’s increased exposure to US cyber espionage, as per the ministry report.

The ministry’s report follows its identification of NSA operatives during a cyberattack on Northwestern Polytechnical University, with a pledge to eliminate all “digital spies” less than a week earlier.

The following report reveals the NSA’s extensive cyberattack capabilities and lists several weapons used for over a decade against multiple countries:-

“Uncovering the main despicable means of cyberattacks and secret theft by US intelligence agencies.”

The US government allegedly used the Foreign Intelligence Surveillance Act to compel businesses to unlock system back doors. It gave examples of access to location and data using X-Mode Social and Anomaly Six.

According to Snowden’s papers, the NSA targeted Huawei to obtain information on their equipment and keep tabs on executive communications.

The covert operation, referred to as Shotgiant, aimed at taking advantage of Huawei’s technological capabilities. The objective was to enable the National Security Agency (NSA) to tap into computer and phone networks through the equipment sold by Huawei to countries that steer clear of purchasing American products, as well as those who are allies of the United States.

NSA access to worldwide networks was the goal of Operation Shotgiant, which sought to take advantage of Huawei technology. It also looked into Huawei’s connections to the Chinese military, but the records offered no convincing proof.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Tushar Subhra

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors…

5 hours ago

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers…

8 hours ago

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious…

8 hours ago

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022…

9 hours ago

Critical Laravel Vulnerability CVE-2024-52301 Allows Unauthorized Access

CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for building…

10 hours ago

4M+ WordPress Websites to Attacks, Following Plugin Vulnerability

A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin, formerly…

12 hours ago