CVERC (China’s security center dealing with large-scale computer viruses) has released a report alleging that 41 types of cyber weapons were used by the US National Security Agency in a cyberattack on one of China’s top universities. According to Chinese researchers, large amounts of sensitive data were stolen through trojan programs and sniffing, known as a sniffing attack.
Web3-focused cyberattacks cost $2.3 billion in 2022
Which method was used in the cyber attack?
CVERC stated that with Suctionchar, one of the key components causing data theft, passwords and accounts used in remote management and file transfer services on targeted servers were stolen. Suctionchar can operate stealthily, monitor logins to the terminal program in real time, and capture all kinds of usernames and passwords. It was stated that Bvp47, a trojan horse program called a backdoor tool, was used together with Suctionchar. Bvp47 has been used in global attacks for over 10 years.
China: US abuses its power
According to the statement of Mao Ning, spokesperson of the Chinese Ministry of Foreign Affairs, 13 personnel from the US government agency are among those affected by the cyber attack. “Cyber world security is a common problem facing all countries in the world. As the country with the most powerful cyber technologies, the United States should immediately stop using its facilities to launch attacks.” says.
China’s largest research university
Located in Xi’an, China, the University (Northwestern Polytechnical University) is a research-oriented institution with aerospace, aerospace and marine technology engineering disciplines. Affiliated with the Ministry of Industry and Information Technology of China, the university is on the U.S. government’s asset list, along with many Chinese educational institutions, including Sichuan University and Beijing University of Aeronautics and Astronautics. U.S.-based companies are prohibited from exporting or transferring certain items to listed companies unless they obtain a license from the government.