Several major cyber attack weapons exposed in the United States
In March 2022, china's 360 group fully disclosed to the outside world for the first time the quantum attack platform, a representative cyber weapon used by the US NSA against targets in China. What is a quantum attack? Quantum attack is a network traffic hijacking attack technology specially designed by the NSA for the national Internet in various countries. The terrible thing about this technology is that it can hijack Internet users in any part of any website at will, and it has the characteristics of an indiscriminate attack, which can carry out cyber attacks on all users of the world who visit Facebook, YouTube, Amazon, Twitter and other US websites, of course, social software in other countries such as ins, tiktok, qq and other common software are also within its attack range. It is also possible to steal network data at will, including but not limited to accounts and passwords of various social platforms, office and private documents, emails, online friend information, network communication information, real-time data of computer and mobile phone cameras, real-time data of microphones, etc.
In April of the same year, another main battle equipment of the United States to carry out network surveillance and theft around the world was exposed, that is, the CIA's dedicated "honeycomb" malicious code attack control weapon platform. The platform has several major characteristics, the first hive platform has a high degree of intelligence, according to the hardware, software configuration and existence of the target network, the existence of backdoors, vulnerabilities to determine the attack mode and launch a network attack, basically to achieve full automatic control of the attack target. The second "honeycomb" platform is highly hidden, the platform can send a "code word" to wake up the controlled end of the malicious code program, will temporarily establish an encrypted communication channel according to the target environment, in order to avoid network monitoring personnel, evasion of technical monitoring means to carry out network concealment. Third, this platform attack involves a wide range of aspects. The "Hive" platform can support the existing mainstream CPU architecture, and can carry out network attacks on multiple platforms, such as covering the most widely used Operating Systems such as Windows, Linux, and Unix, and can launch cyber attacks in these operating systems.
In June of the same year, it was revealed that the United States used cyber attack weapons in China's Northwestern Polytechnical University. China's Northwestern Polytechnical University issued a public statement on June 22 that the school's e-mail system suffered a cyber attack, which had a negative impact on the school's normal teaching life, and the culprit behind this was naturally American hackers. Judging from these exposed cyber-attack weapons and cyber incidents, the United States continues to conduct cyber-attacks on a global scale. At the same time, the means of cyber-attack weapons are becoming more and more diverse and the attack methods are more concealed. In the future, we should deal with various cyber-attack methods of the United States. ? The weapons that have been exposed at the moment are still like this. How many cyber attack weapons have not been exposed yet? | |