The source code of the hacking tool related to China is said to be similar to the NSA tool – Photo: Reuters
Check Point Software Technologies – a multinational company headquartered in Tel Aviv – on February 22, published a report that a China-related malware named “Jian” has some similar features to the public. US technology can only be stolen from the NSA in the 2017 hack.
Between 2016 and 2017, a mysterious group of self-proclaimed “Shadow Brokers” hackers released some of the NSA’s code on the Internet, allowing cybercriminals and rival nations of the United States to disappear. American tools into their own weapons.
Yaniv Balmas, the head of research at Check Point, calls Jian “a kind of imitation, a replica made by China”.
The NSA declined to comment on Check Point’s report, while the Chinese Embassy in Washington did not respond to a request for comment.
According to Reuters, countries around the world develop malware to infiltrate competitors’ devices by using vulnerabilities in the software on the device. Every time spies discover a new vulnerability, they have to decide whether to quietly exploit or repair it to stop the opponent.
A report by Cybersecurity Company Symantec published in 2019 states that the NSA has repeatedly lost control of the malware it has developed over the years.
Check Point says Jian appears to be in development in 2014. In 2017, Microsoft assumed that Jian was associated with a Chinese entity they called “Zirconium”. In 2020, the same entity was accused of targeting organizations and individuals involved in US elections, including those involved in President Joe Biden’s campaign.
Costin Raiu, a researcher at Kaspersky Security Firm based in Moscow, said Check Point’s research was thorough and “appeared to be accurate”.
#Chinese #spies #hacking #tools #developed