US-controlled ‘empire of hackers’ attacking China, other countries: Report

Περισσότερα Νέα

- Advertisement -
  • Investigators accuse CIA of advanced spy tactics against governments, infrastructure, research institutions, and tech and oil companies since 2011
  • China’s foreign ministry calls on US to stop using cyberweapons for global espionage

The CIA has used powerful cyberweapons to attack other countries including China, according to a report released on Thursday (May 4) in China.

The report, jointly released by China’s National Computer Virus Emergency Response Centre (CVERC) and cybersecurity company 360, accused the US Central Intelligence Agency of secretly orchestrating “peaceful evolution” and “colour revolutions” around the world with the use of superior technology.

According to the report, which was focused on numerous cyberattacks within China, investigators captured and extracted a large number of Trojan programs, functional plug-ins and attack platform samples that they said were closely associated with the CIA, revealing an “empire of hackers” under US control.

“These cyberweapons have undergone strict, standardised, and professional software engineering management, which is uniquely followed by the CIA in developing cyberattack weapons,” the report said.

The investigators said their analysis revealed that the CIA’s cyberweapons used state-of-the-art espionage technology in attacks that were closely connected and integrated.

- Advertisement -

“They have now covered almost all internet and IoT (Internet of Things) assets globally, allowing control over foreign networks and theft of important, sensitive data at any time,” the report said.

“Targets of these attacks include critical information infrastructure, aerospace, research institutions, oil and petrochemical industries, large internet companies, and government agencies in various countries. These attacks can be traced back to 2011 and have continued until now.”

It said the information collected from foreign governments, companies and citizens would be provided to US decision-makers for national security intelligence and security risk assessments. At the request of the US president, the CIA also carried out and supervises secret cross-border activities, the report said.

The report also said that, for decades, the CIA had overthrown or tried to overthrow more than 50 legitimate foreign governments – only seven instances of which are acknowledged by the CIA – causing turmoil in the affected countries.

While helping other nations in inciting unrest, the CIA provided various information and communication technologies and even on-site command help, the investigators said.

For example, a US military-affiliated company developed an untraceable TOR technology to help protesters in some Middle Eastern countries maintain communication and evade tracking and arrest, it said. The servers encrypted all information passing through them, ensuring anonymous internet access for specific users, according to the report.

The Rand Corporation had spent years developing “Stampede” software that helped many young people stay connected during protests, greatly improving the efficiency of on-site command, the report said.

“The CIA has long been collecting intelligence information from foreign governments, companies and citizens, and organising, implementing and supervising cross-border secret activities while engaging in continuous espionage and theft,” foreign ministry spokeswoman Mao Ning said on Thursday.

“The international community should be highly vigilant of these activities. The large number of real cases disclosed in the report is yet another example of the CIA’s long-term global cyberattack campaign. The US should pay attention and respond to international concerns, and stop using cyberweapons for global espionage and cyberattacks,” she added.

- Advertisement -

ΑΠΑΝΤΗΣΤΕ

εισάγετε το σχόλιό σας!
παρακαλώ εισάγετε το όνομά σας εδώ

The reCAPTCHA verification period has expired. Please reload the page.

Ροή ειδήσεων

ΣΧΕΤΙΚΑ ΑΡΘΡΑ

Beijing can’t go all out to help Iran with weapons, has to keep Donald Trump in good humour

China supplying the theocratic Islamic regime in Iran with weapons and technology is no secret, but the options before Beijing are also limited by...

Poll: Finns want EU to cut dependency on US & China

People in Finland broadly support reducing the EU's economic and technological dependencies on the US and China. That’s according to a survey published on Friday...

Operation Sindoor: How Pakistan’s Counter-Strike Campaign Failed Against India’s Air-Defence Architecture

If the night of 7 May 2025 was the moment Pakistan’s narrative-makers seized on, the seventy-two hours that followed were the period during which...

EU blocks funding for certain Chinese solar tech

The EU is cutting public funding to clean tech projects using certain Chinese technology that could pose risks to the bloc's power grid, officials...

ΔΗΜΟΦΙΛΗ ΑΡΘΡΑ

Κάποιος να τους ”μαζέψει”-Τούρκοι: ”Θα επανασχεδιάσουμε τον χάρτη της Μεσογείου”-Βίντεο με προκλητικούς χάρτες

Τι αναφέρει τουρκικό ΜΜΕ: ''Η Τουρκία ετοιμάζει ένα σχέδιο για την ανακήρυξη αποκλειστικής οικονομικής ζώνης που εκτείνεται έως και 200 ​​ναυτικά μίλια. Αυτό το...

Γερμανικό ΜΜΕ αποθεώνει την Τουρκία!-Νεό ”χτύπημα” κατά Ελλάδας! – Fake news δυνατής Άγκυρας

Η γερμανική εφημερίδα FAZ δημοσίευσε άρθρο με τίτλο «Τα μαθήματα που μπορεί να αντλήσει το ΝΑΤΟ από την Τουρκία» ▪️«Η Τουρκία, δοκιμασμένη από κρίσεις, μετατρέπεται...

Η τουρκική πρακτική των Ιμίων ως μοντέλο επιχειρησιακής και πολιτικής αμφισβήτησης ελληνικής κυριαρχίας!

Τι αναφέρει ο λογαριασμός Moderatus Η τουρκική πρακτική των Ιμίων ως μοντέλο επιχειρησιακής και πολιτικής αμφισβήτησης ελληνικής κυριαρχίας, πιθανότατα να χρησιμοποιηθεί στις λεγόμενες...

Σε εξέλιξη η άσκηση “EFES” – Το σενάριο για ”επίθεση & κατάληψη νησιών στο Αιγαίο” – Τους περιμένουμε!

Το τουρκικό νομοσχέδιο για τις θαλάσσιες ζώνες αποτελεί την επίσημη απόπειρα της Άγκυρας να μετατρέψει το δόγμα της «Γαλάζιας Πατρίδας» σε εσωτερικό δίκαιο. Σύμφωνα...