Thursday, April 25, 2024

U.S Based CIA Hacking Group Launched Massive Cyber Attack on China for 11 Years – A Shocking Report

A Chinese security firm revealed a shocking report that says, the U.S based Central Intelligence Agency (CIA) has continuously launched a cyber attack on China between 2008- 2019.

In these 11 years of period, the CIA targets several industries in China including aviation organizations, scientific research institutions, petroleum industry, Internet companies, and government agencies.

CIA is the U.S originated Government based Intelligence Agency which is involved for various operation such as spying foreign governments, companies, and individuals, analysing the information that collected by other agencies, reporting the national intelligence assignment to .U.S decision-makers and more.

IN 2017, We have reported a biggest CIA’s hacking Arsenal Vault 7 leaks that played a major role in this discovery, in which Wikileaks disclosed 8716 documents (including 156 top secrets Document) from the CIA “Backup” Copy “that contains a detailly records the CIA hacking group’s attack methods, targets, Powerful tools, and technical specifications and requirements.

There are 5 shreds of evidence found by Qihoo 360 that reveal APT-C-39 is Affiliated with the CIA.

Evidence 1: APT-C-39 uses massive exclusive cyber weapons in the CIA’s Vault 7 project.

Evidence 2: The technical details of most samples of the APT-C-39 are consistent with the ones described in the Vault 7 documents.

Evidence 3: Before the Vault 7 cyber weapon was disclosed by WikiLeaks, the APT-C-39 already used relevant cyberweapons against targets in China.

Evidence 4: Some attack weapons used by the APT-C-39 are associated with the NSA.

Evidence 4: Some attack weapons used by the APT-C-39 are associated with the NSA.

Discovery of APT-C-39 (CIA Hacking Group)

Researchers from Qihoo 360 digging deeper into the leaked documents and found that the tools in the Vault 7 Arsenal have been used to perform some of the series of targeted hacking attacks on Chinese organizations and government agencies.

Based on the researcher report, These attacks are attributed to a U.S.-related APT organization – APT-C-39 and also they found that the attackers mainly targeted the system developers in Chinese aviation organizations and scientific research sectors to carry out the campaigns.

CIA(APT-C-39 ) also accused of attacking the technology sectors of civil aviation are not only in China but also involves hundreds of commercial airline national states.

Also, researchers believed that these 11 years of period, the CIA may have already gathered the most classified business information of China, even of many other countries in the world.

Tracked Down the Key Figure of CIA Cyber Arsenal R & D

Qihoo 360 figured out a Joshua Adam Schulte, a former CIA Employee and the Master Mind of CIA Cyber Arsenal R & D and he worked for the National Security Agency (NSA) as an intern for some time, and then joined CIA in 2010.

Joshua was misused his admin privilege of the secrete core room, and implant a backdoor to steal the classified documents of Vault 7 which has been later disclosed to WikiLeaks, and it was frequently published in WikiLeaks Website in 2017.

This is one of the biggest leaks of classified national defense information in the history of CIA” by disclosing the agency’s secret hacking tools to WikiLeaks.

Joshua was arrested in 2018 and prosecuted by the U.S. Department of Justice and February 4, 2020, at a public hearing in the federal court, the federal prosecutor alleged that Joshua, as the core developer and the person in charge of the highest administrator authority of its internal arsenal.

Website

Latest articles

Analyze Malicious Powershell Scripts by Running Malware in ANY.RUN Sandbox

Hackers exploit PowerShell, a built-in scripting tool on Windows (and sometimes Linux), to launch...

Beware! Zero-click RCE Exploit for iMessage Circulating on Hacker Forums

A new cybersecurity threat has emerged as a zero-click remote code execution (RCE) exploit...

New DragonForce Ransomware Emerged From The Leaked LOCKBIT Builder

Hackers exploit LOCKBIT Builder due to its versatility in creating customized ransomware payloads which...

JudgeO Online Code Editor Flaw Let Attackers Execute Code as Root User

A critical flaw has been identified in the popular online code editor, JudgeO.If...

Cyber Attack Defenders Up For Battle: Huge Uptick In Timely Detections

Attackers are employing evasion techniques to bypass detection and extend dwell time on compromised...

Alert! Cisco Releases Critical Security Updates to Fix 2 ASA Firewall 0-Days

Cisco has released critical security updates to address multiple vulnerabilities in its Adaptive Security...

Pakistani APT Hackers Attacking Indian Govt Entities With Weaponized Shortcut Files

Cybersecurity experts at Seqrite Labs have reported a surge in cyberattacks against Indian government...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles