• About Us
  • Contact Us
  • Cookie policy (EU)
  • Home
  • Privacy Policy
  • Video
  • Write for us
Today Headline
  • HOME
  • NEWS
    • POLITICS
    • News for today
    • Borisov news
  • FINANCE
    • Business
    • Insurance
  • Video
  • TECHNOLOGY
  • ENTERPRISE
  • LIFESTYLE
    • TRAVEL
    • HEALTH
    • ENTERTAINMENT
  • AUTOMOTIVE
  • SPORTS
  • Travel and Tourism
  • HOME
  • NEWS
    • POLITICS
    • News for today
    • Borisov news
  • FINANCE
    • Business
    • Insurance
  • Video
  • TECHNOLOGY
  • ENTERPRISE
  • LIFESTYLE
    • TRAVEL
    • HEALTH
    • ENTERTAINMENT
  • AUTOMOTIVE
  • SPORTS
  • Travel and Tourism
No Result
View All Result
TodayHeadline
No Result
View All Result

Chinese spyware code was copied from America’s NSA: researchers

February 22, 2021
in Technology
0
Chinese spyware code was copied from America’s NSA: researchers
0
SHARES
7
VIEWS
Share on FacebookShare on Twitter



WASHINGTON – Chinese spies used code first developed by the US National Security Agency to support their hacking operations, Israeli researchers said on Monday, another indication of how malicious software developed by governments can boomerang against their creators.

Tel Aviv-based Check Point Software Technologies issued a report noting that some features in a piece of China-linked malware it dubs “Jian” were so similar they could only have been stolen from some of the National Security Agency break-in tools leaked to the internet in 2017.

Yaniv Balmas, Checkpoint’s head of research, called Jian “kind of a copycat, a Chinese replica.”

The find comes as some experts argue that American spies should devote more energy to fixing the flaws they find in software instead of developing and deploying malicious software to exploit it.

The NSA declined comment. The Chinese Embassy in Washington did not respond to requests for comment.

A person familiar with the matter said Lockheed Martin Corp – which is credited as having identified the vulnerability exploited by Jian in 2017 – discovered it on the network of an unidentified third party.

In a statement, Lockheed said it “routinely evaluates third-party software and technologies to identify vulnerabilities.”

Countries around the world develop malware that breaks into their rivals’ devices by taking advantage of flaws in the software that runs them. Every time spies discover a new flaw they must decide whether to quietly exploit it or fix the issue to thwart rivals and rogues.

That dilemma came to public attention between 2016 and 2017, when a mysterious group calling itself the “Shadow Brokers” published some of the NSA’s most dangerous code to the internet, allowing cybercriminals and rival nations to add American-made digital break-in tools to their own arsenals.

How the Jian malware analyzed by Checkpoint was used is not clear. In an advisory published in 2017, Microsoft Corp suggested it was linked to a Chinese entity it dubs “Zirconium,” which last year was accused of targeting U.S. election-related organizations and individuals, including people associated with President Joe Biden’s campaign.

Checkpoint says Jian appears to have been crafted in 2014, at least two years before the Shadow Brokers made their public debut. That, in conjunction with research published in 2019 by Broadcom Inc-owned cybersecurity firm Symantec about a similar incident, suggests the NSA has repeatedly lost control of its own malware over the years.

Checkpoint’s research is thorough and “looks legit,” said Costin Raiu, a researcher with Moscow-based antivirus firm Kaspersky Lab, which has helped dissect some of the NSA’s malware.

Balmas said a possible takeaway from his company’s report was for spymasters weighing whether to keep software flaws secret to think twice about using a vulnerability for their own ends.

“Maybe it’s more important to patch this thing and save the world,” Balmas said. “It might be used against you.”

Tags: AmericasChineseCodecopiedNSAresearchersspyware
Previous Post

Boris Johnson finally reveals his roadmap out of lockdown

Next Post

‘Hit-and-run DUI driver’ had blood alcohol level more than nine times legal limit

Related Posts

Can WhatsApp messages be secure and encrypted—but traceable at same time?
Technology

Can WhatsApp messages be secure and encrypted—but traceable at same time?

Cryptographer and computer scientist Mayank...

Read more
A flexible, rod-driven soft robot for biomedical applications
Technology

A flexible, rod-driven soft robot for biomedical applications

Structure of the rod-driven soft...

Read more
Deepfakes expose vulnerabilities in certain facial recognition technology
Technology

Deepfakes expose vulnerabilities in certain facial recognition technology

Credit: Pixabay/CC0 Public Domain Mobile...

Read more
Prediction of human movement during disasters could allow for more effective emergency response
Technology

Prediction of human movement during disasters could allow for more effective emergency response

Credit: Unsplash/CC0 Public Domain The...

Read more
Researchers mitigate potential side-channel attack vulnerability in multicore processors
Technology

Researchers mitigate potential side-channel attack vulnerability in multicore processors

MIT researchers have shown that...

Read more
Load More
Next Post
‘Hit-and-run DUI driver’ had blood alcohol level more than nine times legal limit

'Hit-and-run DUI driver' had blood alcohol level more than nine times legal limit

  • Trending
  • Comments
  • Latest
Six times actors really romped in sex scenes that make 365 DNI look tame

Six times actors really romped in sex scenes that make 365 DNI look tame

Strictly: Ofcom assessing Steve Allen’s Tilly Ramsay comments

Strictly: Ofcom assessing Steve Allen’s Tilly Ramsay comments

What are the leaked photos of Kobe Bryant at the helicopter crash site?

What are the leaked photos of Kobe Bryant at the helicopter crash site?

Do Sex Dolls Feel Real? – Answering Important Questions 

Chilling new film offers a provocative reminder of evil

Chilling new film offers a provocative reminder of evil

Creative spaces: seven ways the new retail world is making life more real | How retail got real

Creative spaces: seven ways the new retail world is making life more real | How retail got real

Fans are all saying the same thing as Man Utd transfer target Antony scores wonder goal for Ajax

Fans are all saying the same thing as Man Utd transfer target Antony scores wonder goal for Ajax

Liz Truss Doubles Down On Tax Cutting Plans As Cost-Of-Living Crisis Grows

Liz Truss Doubles Down On Tax Cutting Plans As Cost-Of-Living Crisis Grows

About Us

Todayheadline the independent news and topics discovery
A home-grown and independent news and topic aggregation . displays breaking news linking to news websites all around the world.

Follow Us

Latest News

Chilling new film offers a provocative reminder of evil

Chilling new film offers a provocative reminder of evil

Creative spaces: seven ways the new retail world is making life more real | How retail got real

Creative spaces: seven ways the new retail world is making life more real | How retail got real

Chilling new film offers a provocative reminder of evil

Chilling new film offers a provocative reminder of evil

Creative spaces: seven ways the new retail world is making life more real | How retail got real

Creative spaces: seven ways the new retail world is making life more real | How retail got real

Fans are all saying the same thing as Man Utd transfer target Antony scores wonder goal for Ajax

Fans are all saying the same thing as Man Utd transfer target Antony scores wonder goal for Ajax

  • Real Estate
  • Education
  • Parenting
  • Cooking
  • NFL Games On TV Today
  • Travel and Tourism
  • Home & Garden
  • Pets
  • Privacy & Policy
  • Contact
  • About

© 2021 All rights are reserved Todayheadline

No Result
View All Result
  • Real Estate
  • Education
  • Parenting
  • Cooking
  • NFL Games On TV Today
  • Travel and Tourism
  • Home & Garden
  • Pets
  • Privacy & Policy
  • Contact
  • About

© 2021 All rights are reserved Todayheadline

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist