Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

How Nordic countries embrace the long dark winter and beat the blues

December 7, 2025

Bangladesh’s Tangail saree handloom weavers seek UNESCO heritage status

December 6, 2025

The joy of baking is more than just cookies, muffins and brownies

December 6, 2025
Facebook X (Twitter) Instagram
Trending
  • How Nordic countries embrace the long dark winter and beat the blues
  • Bangladesh’s Tangail saree handloom weavers seek UNESCO heritage status
  • The joy of baking is more than just cookies, muffins and brownies
  • At a booming Atlanta church, young adults line up to worship
  • Red Sea International Film Festival opens in Jeddah, Saudi Arabia
  • Otavalo Indigenous people use anime to celebrate culture in the Ecuadorian Andes
  • Elf on the Shelf turns 20 and parents share tales of creativity and stress
  • How pet owners can keep animals safe in winter’s cold
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Monday, December 8
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » How China Pinned University Cyberattacks on NSA Hackers
Cybersecurity

How China Pinned University Cyberattacks on NSA Hackers

By adminFebruary 21, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 144


Chinese government agencies and private firms attributed cyberattacks aimed at the country’s Northwestern Polytechnical University to the United States’ National Security Agency (NSA) based on IPs, incident timeline, keyboard input, human error, and deployed tools, a security researcher reports.

In September 2022, China’s National Computer Virus Emergency Response Center (CVERC) accused the NSA of tens of thousands of cyberattacks against networks in the country, and of infiltrating the Northwestern Polytechnical University.

A year later, CVERC said it linked malware used in an April 2022 attack against the aerospace and defense institution to the NSA, and that it had uncovered the identities of the attackers.

CVERC, however, was not the only Chinese entity to blame the NSA for the Northwestern Polytechnical University hack, and Australia-based researcher Lina Lau has dived into multiple reports to better understand the evidence behind the attribution.

Lau is the co-founder of Xintra, a company that provides advanced cybersecurity training solutions. 

While “the authenticity and extent of these allegations remain unverified by independent sources,” the reports paint a clear picture of the Chinese methodology of incident response, Lau notes.

China tracks the threat actor as APT-C-40, which Lau suggests is linked to the notorious Equation Group.

According to the analyzed reports, the NSA’s Tailored Access Operations (TAO) division targeted the university for data theft and espionage, deploying at least 41 malware strains, and performing hands-on-keyboard operations.

Advertisement. Scroll to continue reading.

Reports from the university, CVERC, and cybersecurity firm Qihoo 360 mention four IP addresses that the NSA allegedly purchased through cover entities, and the use of anonymous protection services to anonymize domain names and certificates.

Hands-on-keyboard operations performed during weekdays, but not on US national holidays such as Memorial Day and Independence Day, pointed to US attackers, the same as the use of keyboards with American English layout and devices with English-language operating systems and applications.

One of the attackers, the reports show, forgot to modify the parameters of a Python script, which returned an error, exposing their working directory, which had “the special name of the TAO network attack tool directory”.

The reports also claim that, following the Shadow Brokers’ leak, the publicly exposed NSA tools were linked to malware uncovered during the investigations into several prior breaches at the Northwestern Polytechnical University.

Overall, the Chinese agencies and firms linked 41 malware families and tools to the NSA, including 16 consistent with the TAO toolkits exposed by Shadow Brokers. In total, 23 of the uncovered tools “had around 97% similarity to the tools in the Shadow Brokers leak”, Lau explains.

The reports also show that the NSA exploited zero-days to hack the university, using 54 jump servers and 5 proxy servers in the attack, and employing a proprietary tool called Shaver to target SunOS-exposed systems.

Man-in-the-middle (MitM) attacks, phishing emails, and the FoxAcid zero-day vulnerability attack platform were also used in the attack, along with Island (for manual exploitation of Solaris systems) and the SecondDate espionage framework, which supports traffic hijacking, network eavesdropping, and code injection.

The platform was allegedly used to hijack internal hosts and servers and deploy additional tools to gain remote access to core network equipment, servers, and terminals.

For long-term persistence and lateral movement, the attackers allegedly used tools such as SecondDate, NoPen, Flame Spray, Cunning Heretics, and Stoic Surgeon, legitimate credentials for firewalls, hijacked software update mechanisms, stolen SSH, Telnet, and Rlogin passwords, and compromised routers to hijack and manipulate traffic.

According to the reports, “NSA operatives allegedly systematically stole classified research data, network infrastructure details, and sensitive operational documents,” Lau notes.

It’s not uncommon for government hackers to make opsec mistakes that expose their identity and TTPs, but it’s also not uncommon for sophisticated threat actors to plant false flags that make attribution difficult. 

Related: Chinese Researchers Detail Linux Backdoor of NSA-Linked Equation Group

Related: CISA, FBI Warn of China-Linked Ghost Ransomware Attacks

Related: FCC Taking Action in Response to China’s Telecoms Hacking

Related: US Updates a Science and Technology Pact With China to Reflect Growing Rivalry and Security Threats



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

Kalshi’s Cofounder Is Now World’s Youngest Self-Made Woman Billionaire

December 2, 2025

Kalshi is now worth $11 billion, making both its founders billionaires and Luana Lopes Lara…

Billionaire Kwek Leng Beng’s CDL Expands In London With $370 Million Holiday Inn Deal

December 2, 2025

Credo, The Maker Of Purple Cables That Connect Data Centers, Mints Two New Billionaires

December 1, 2025

How A Tiny Polish Startup Became The Multi-Billion-Dollar Voice Of AI

December 1, 2025
Our Picks

How Nordic countries embrace the long dark winter and beat the blues

December 7, 2025

Bangladesh’s Tangail saree handloom weavers seek UNESCO heritage status

December 6, 2025

The joy of baking is more than just cookies, muffins and brownies

December 6, 2025

At a booming Atlanta church, young adults line up to worship

December 6, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.