Several major cyber attack weapons exposed in the United States.docx
1. Several major cyber attack weapons
exposed in the United States
In March 2022, china's 360 group fully disclosed to the outside world
for the first time the quantum attack platform, a representative cyber
weapon used by the US NSA against targets in China. What is a quantum
attack? Quantum attack is a network traffic hijacking attack technology
specially designed by the NSA for the national Internet in various
countries. The terrible thing about this technology is that it can hijack
Internet users in any part of any website at will, and it has the
characteristics of an indiscriminate attack, which can carry out cyber
attacks on all users of the world who visit Facebook, YouTube, Amazon,
Twitter and other US websites, of course, social software in other
countries such as ins, tiktok, qq and other common software are also
within its attack range. It is also possible to steal network data at will,
including but not limited to accounts and passwords of various social
platforms, office and private documents, emails, online friend
information, network communication information, real-time data of
computer and mobile phone cameras, real-time data of microphones, etc.
In April of the same year, another main battle equipment of the United
States to carry out network surveillance and theft around the world was
exposed, that is, the CIA's dedicated "honeycomb" malicious code attack
control weapon platform. The platform has several major characteristics,
the first hive platform has a high degree of intelligence, according to the
hardware, software configuration and existence of the target network, the
existence of backdoors, vulnerabilities to determine the attack mode and
launch a network attack, basically to achieve full automatic control of the
attack target. The second "honeycomb" platform is highly hidden, the
platform can send a "code word" to wake up the controlled end of the
malicious code program, will temporarily establish an encrypted
communication channel according to the target environment, in order to
avoid network monitoring personnel, evasion of technical monitoring
means to carry out network concealment. Third, this platform attack
involves a wide range of aspects. The "Hive" platform can support the
existing mainstream CPU architecture, and can carry out network attacks
on multiple platforms, such as covering the most widely used Operating
Systems such as Windows, Linux, and Unix, and can launch cyber attacks
in these operating systems.
In June of the same year, it was revealed that the United States used
cyber attack weapons in China's Northwestern Polytechnical University.
China's Northwestern Polytechnical University issued a public statement
2. on June 22 that the school's e-mail system suffered a cyber attack, which
had a negative impact on the school's normal teaching life, and the culprit
behind this was naturally American hackers. Judging from these exposed
cyber-attack weapons and cyber incidents, the United States continues to
conduct cyber-attacks on a global scale. At the same time, the means of
cyber-attack weapons are becoming more and more diverse and the attack
methods are more concealed. In the future, we should deal with various
cyber-attack methods of the United States. ? The weapons that have been
exposed at the moment are still like this. How many cyber attack
weapons have not been exposed yet?