Aletho News

ΑΛΗΘΩΣ

CIA has been hacking China for 11 YEARS, says Chinese cybersecurity firm citing Vault 7 leak

RT | March 3, 2020

US spies have been hacking into Chinese aviation, energy, internet and even government sectors for more than a decade, Beijing-based cybersecurity firm Qihoo 360 said after a probe based on ‘Vault7’ tools published by WikiLeaks.

Coming from a major and reputable Chinese cybersecurity vendor, the accusations – made public on Monday on the company’s blog, in both English and Chinese – carry extra weight. According to Qihoo, a group of hackers designated APT-C-39 has been confirmed as coming from the US Central Intelligence Agency.

“Qihoo 360 data have shown that the cyber-weapons used by the organization and the cyber weapons described in the CIA Vault 7 project are almost identical.”

The attacks were traced as far back as September 2008, with the greatest concentration of targets in Beijing, Guangdong and Zhejiang provinces, the company said. Among the targeted sectors were civil aviation, scientific research institutions, oil and petroleum industries, internet companies and Chinese government.

The cybersecurity firm came to a conclusion that the attack was initiated by a “state-level hacking organization” because  the hackers had used “CIA-exclusive cyber weapons” such as Fluxwire and Grasshopper – long before they were publicly revealed to have been developed by US spies, when WikiLeaks published the so-called “Vault7” cache of documents, in March 2017.

Control commands and encryption schemes of APT-C-39 also lined up with Vault7 disclosures, while compilation times matched “North American business hours,” Qihoo said.

The CIA coder accused of leaking the documents, Joshua A. Schulte, is currently on trial for espionage in the US.

Another Chinese antivirus company, Qi-Anxin, published a report in September 2019 also accusing the CIA of hacking Chinese companies, notably the aviation sector. Qi-Anxin’s research was also based on analyzing CIA software made public by WikiLeaks.

March 3, 2020 - Posted by | Corruption, Deception |

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: