728 x 90

Chinese hackers repurposed captured NSA hacking tools to carry out cyber-attacks in 2016

Chinese hackers repurposed captured NSA hacking tools to carry out cyber-attacks in 2016

In 2017, a hacking group named Shadow Brokers published sets of NSA’s hacking tools online. Image via Pixabay Two hacking tools created by the US National Security Agency (NSA) were repurposed by a group of Chinese hackers to attack targets in Europe and Asia in 2016.  That‘s according to researchers at Symantec, who claim today that hacking groups based

Chinese hackers repurposed captured NSA hacking tools to carry out cyber-attacks in 2016

In 2017, a hacking group named Shadow Brokers published sets of NSA’s hacking tools online. Image via Pixabay

Two hacking tools created by the US National Security Agency (NSA) were repurposed by a group of Chinese hackers to attack targets in Europe and Asia in 2016. 

Thats according to researchers at Symantec, who claim today that hacking groups based in China started using the tools about 14 months before they were leaked by a peculiar group calling itself the Shadow Brokers.

In 2017, Shadow Brokers published several tranches of NSA hacking tools and exploits online, some of which were subsequently used in security breaches around the world, including the WannaCry ransomware attacks and NotPetya worms attacks.

While Shadow Brokers repeatedly claimed to have stolen the tools directly from the NSA via a compromised server, the researchers couldn’t find the evidence to back that up. 

Now, the findings of the investigation by Symantec indicate that the China-based Buckeye group had acquired some of the NSAs tools months before Shadow Brokers started publishing them on the internet.

You cannot guarantee your tools will not get leaked and used against you and your allies

Buckeye is the codename for Chinese intelligence contractors that work for the Chinese Ministry of State Security. Based in Guangzhou, Buckeye is also known by several other names, including Gothic Panda, APT3, TG-0110, and UPS Team.

According to Symantec, Buckeye acquired the NSAs trove of hacking tools after attacks by the US agency on its systems.

The group altered the tools to create its own versions and then surreptitiously used those tools for several months before they were published by Shadow Brokers.

Attacks were carried out on various educational institutions, scientific research organisations and computer networks in at least five places, including Luxembourg, Belgium, Vietnam, Hong Kong and the Philippines, according to the research.

One attack on a telecom network may have given attackers access to hundreds of thousands of private communications, Symantec claimed.

Buckeye is the codename for Chinese intelligence contractors that work for the Chinese Ministry of State Security

Symantecs report is the latest evidence to suggest that it is becoming increasingly difficult for the US to keep track of the backdoors its uses to break into adversaries networks.

The episode also sets off a debate within the cyber-security community over whether US agencies should continue to develop some of the worlds most stealthy cyberweapons if they cant keep them under lock.

“Weve learned that you cannot guarantee your tools will not get leaked and used against you and your allies,” Eric Chien, a security director at Symantec, told the New York Times.

“People come and go. Clearly the tools live on,” he added.

Logo for the Computing and CRN Women in Tech Festival 2019

Computing and CRN have united to present the Women in Tech Festival UK 2019, on 17 September in London.

The event will celebrate successful women in the IT industry, enabling attendes to hear about, and to share, personal experiences of professional journeys and challenges.

Whether you’re the ‘Next Generation’, an ‘Inspirational Leader’, or an ‘Innovator of Tech’ this event will offer inspiration on not only how to improve yourself, but how to help others too.  The event is FREE for qualifying IT pros, but places will go fast

Further reading

[ad_2]

Source link

Susan E. Lopez
ADMINISTRATOR
PROFILE

Posts Carousel

Leave a Comment

Your email address will not be published. Required fields are marked with *

Latest Posts

Top Authors

Most Commented

Featured Videos