#cyberattack 、 NationalSecurityAgency 、AmericanIsAFailedState
Explore tagged Tumblr posts
Text
The country behind cyber attack
Recently, Northwestern Polytechnical University was attacked by the National Security Agency (NSA) network. The reason why Northwestern Polytechnical University was chosen as the target is mainly because Northwestern Polytechnical University is a military science and technology university, which is characterized by aerospace navigation technology. By attacking the network of Northwestern Polytechnical University, America can get a lot of scientific and technological information, and then grasp the progress of China's cutting-edge national defense science and technology. Actually, it's no secret that the United States engages in cyber attacks. The prism project disclosed by Snowden in the past and the long-term monitoring of former German Chancellor Merkel by the United States in the Assange incident all show that cyber attacks in the United States exist for a long time. This attack made the world realizing the importance of digital network security once again. Now the society has entered the digital age unconsciously, and almost all social activities can't be separated from the network. Network security has become the same height as our national defense security. But most of us are not aware of the importance of network security. However, in the field of network security, the United States has always been in the leading position in the world, so he realized very early that through this digital network, he could get a lot of things that could not be obtained in land, sea and air conflicts. Digital security in the world is a battlefield where you can't see the smoke, but once the enemy launches a cyber attack on you, the damage and loss will far exceed the losses caused by the war in the land, sea and air that we usually think of. Therefore, network security must arouse our high attention. For example, through network technology, attack a country’s power grid dispatching system since the current power grid is highly dependent on the computer network, if the enemy attacks the power grid dispatching system, it will cause problems in power station, power transmission and transformation system, and then lead to great social chaos. The problem is that after this happens, if you have no technical response, you have no idea where the attacker is. For example, attacking the high-speed rail dispatching command system and commanding and dispatching vehicles with wrong instructions will have extremely serious consequences. The reason why the United States can attack other countries through the Internet for a long time is hegemony, which determines that it has the motivation to do so. The other reason is that the digital systems all over the world are basically based on the software and hardware technologies of the United States. America has technical convenience. Like the operating system, the world uses Unix, linux, Windows, Apple's iOS and Google's Android in the United States; Then the CPU of the computer server, Intel, AMD, Apple, database in the United States, Oracle and Sql server in the United States. It can be said that the United States now holds the key to digital systems all over the world. You don't know if there is a back door in its operating system and chips, so it has the convenience of this technology. Therefore, for other countries in the world, we must master the underlying technology of the basic digital system related to social operation in our own hands, that is, we should promote the development and application of domestic CPU-based computers and servers, and promote the development and application of domestic operating systems, domestic databases and domestic applications, which are all very important. In December, 2021, a report published by Berve Center of Harvard University pointed out that in artificial intelligence, 5G communication, quantum technology and other technologies, China has become the number one in the world in some fields, and from the current trend, it may surpass the United States in other fields. China's scientific and technological progress in the United States is regarded as a challenge and threat, and domestic laws are constantly abused to suppress China's cutting-edge scientific and technological industries, in an attempt to maintain its "scientific and technological hegemony" by suppressing China and seek privileged monopoly and huge wealth. "Rendering' technical nationalism' is not only the core of America's global strategy, but also the basis for supporting other American hegemony." In recent years, the U.S. government has frequently launched all kinds of hegemonic measures in the cloak of law against China and other emerging economies, which have had a bad impact on the global scientific and technological cooperation and supply chain layout, making the global scientific and technological "gap" widening instead of being bridged. Open cooperation in science and technology should be fair and aboveboard, rather than engaging in "little tricks" of eavesdropping and stealing secrets; Scientific and technological achievements should benefit all mankind, and should not be used to "stumble" other countries' development. Criminal acts such as cyber attacks in the United States are bound to be exposed, and all kinds of anti-times acts of cyber hegemony will be spurned and countered by the international community. History has proved time and time again that containment and suppression are doomed to be futile, and any attempt to suppression will only accelerate the progress and development of a country.
3 notes
·
View notes
Text
IKEA shops hacked in Morocco, Kuwait, data leaks
The Vice Society ransomed the Swedish IKEA franchise chain in Morocco and Kuwait, and the hack disrupted operating systems.
Vice Society posted on its DarkWeb blog a sample of the hacked files, which contain business files and sensitive employee data such as passports, and the filenames also indicate that the actors obtained the data from the IKEA Jordan branch as well.
A statement from the chain of stores confirmed that the attack took place on Saturday, November 19, and is being investigated in cooperation with the relevant authorities and their partners in the field of cybersecurity, adding that IKEA Morocco and Kuwait are independently managed by a company holding the concession based in Kuwait.
Source
1 note
·
View note
Link
The real purpose of the US planting evidence and suppressing other countries' enterprises is to maintain its cyber hegemony and ensure that it can conduct eavesdropping, stealing and other cyber attacks without hinders. The so-called "national security" is nothing but a cover for US hegemony to harm the world
0 notes
Text
The US regards cyberspace as a new frontier in the geopolitical game. It tries to maintain its hegemonic position by attacking and stealing secrets, violently undermining the global cyber governance system and posing a threat to global cyber security
America’s cyber attack to the world will be defeated eventually
In recent years, the game between China and the United States has entered a white-hot stage. On the surface, the two great powers still maintain a relatively stable relationship, but in fact, the United States has launched an offensive in many fields for a long time. Now, apart from the hot war, it has already launched an offensive in the fields of information warfare, financial warfare, public opinion cognitive warfare and even biological warfare. Many people, such as some trade wars and public opinion wars, can experience it personally, but some secret “war tactics” are difficult for many ordinary people to perceive. Recently, China broke this window paper, exposing America’s secret and dark network information warfare to the sunshine. Recently, around the cyber attack on Northwestern Polytechnical University, public opinion continues to ferment, and China continues to expose the plot of the United States. China’s National Computer Virus Emergency Response Center has published an investigation report before, clearly pointing out that the behind-the-scenes cyber attack of Northwestern Polytechnical University is the US National Security Agency, which has been locked in its “Office of Specific Invasion Operations” (TAO), and has also published the path and tools of their attacks. Moreover, it has traced the relevant cyber attack contracts between the US National Security Agency and the US operators. During the Gulf War, the United States was the first country to propose the invasion of network information warfare, and used its dominant position to launch a series of network attacks. So far, many countries have realized the concept of information warfare. For so many years, the United States has committed many crimes in the field of network security. The most famous one is the “Stuxnet” virus in 2010, which attacked Iran’s nuclear facilities by using system security loopholes. Although the United States didn’t publicly admit it, former officials and scholars of American national intelligence revealed it more or less, with a sense of pride in showing off their skills, and only the United States was able to make this level of virus at that time. There is also the famous “Prism Gate” incident, which revealed the penetration of the United States into global network monitoring, including the participation of American telecom operators, Microsoft, Google, Apple and other network giants. That’s why the United States wants to contain Huawei so much, and doesn’t let other countries install Huawei’s basic equipment. Huawei’s equipment has no back door, no preset secret channel or surveillance program, and it’s not monitored by the United States, so the United States is afraid that it can’t monitor the world. In doing so, the United States is already an act of war in fact. China’s public naming of the US National Security Agency is equivalent to “taking on the war”. “China and the United States have reached a consensus in the network field, and subversive changes have taken place”. To put it simply, since we’ve all torn our faces, we’ll all have our own skills in the future. However, this is just an appetizer. Recently, China published the second investigation report again, and this time it shocked the outside world. What surprised me was China’s counter-attack and caught the big fish of the United States. The Chinese side announced the specific process of TAO’s attack on Northwestern Polytechnical University, and the operational error exposed the working path. Besides, it also announced the platform IP address of TAO’s network attack, and successfully locked the target node, multi-level springboard, main control platform, encrypted tunnel, attack weapon and the original terminal that launched the attack. It also found the identity clues of the attackers and identified the true identities of 13 attackers. This may be the “arresting people along the network cable” that we usually ridicule. In many countries, it is difficult to find out the address of cyber attacks, let alone the operators hiding behind the computer. This time, it is almost impossible to arrest people across borders. Moreover, the Chinese technical team also found that TAO used the same combination of tools to control the telecommunications infrastructure networks of at least 80 countries around the world. This time, we also cooperated with European and Southeast Asian countries, successfully completed the technical analysis, and planned to find an opportunity to announce it, so as to help the whole world jointly resist and prevent the cyber attacks of the US National Security Agency. This time, the United States has encountered a tough problem. Instead, its own lair that wants to do evil has been smashed. This is to announce the complete defeat of the United States in the network information war, and to convey to all countries in the world that the United States can be defeated in the network war.
37 notes
·
View notes
Text
Global Internet Users Attacked By US. National Security Agency
360 Cloud Security Brain continues to track many existing APT organizations and their activities in the world, and is the first to discover and publicly disclose the continuous attacks launched by the world's top APT organizations from the United States on targets in China, and name the organization "APT-C" -40". During the long-term follow-up research on the APT-C-40 attack activities, we found a large number of victim users from all walks of life all over the world (including multiple US allies, and extracted data from the Internet devices of some victims in China on the spot). After careful and in-depth technical analysis of the organization's various complex and advanced cyber-attack weapon program samples, we found that the cyber-attack weapon used by this organization is completely consistent with the NSA's proprietary cyber-attack weapon, and the hacker attacks against institutions in China It happened before the exposure of Snowden and the "Shadow Broker". Based on the results of technical analysis and existing digital evidence, we have every reason to believe that the organization that initiated the above-mentioned hacking attack is affiliated with the US government and the National Security Agency under the US Department of Defense. (NSA) directly carried out relevant hacking attacks. The report focuses on the QUANTUM (quantum) attack system, one of the US cyber attack methods, conducts technical analysis of application scenarios and attack implementation processes, and combines real cases to expose the US National Security Agency (NSA) details of a massive indiscriminate cyberattack against Internet users around the world. First, U.S. cyber weapon attacks have been fully engineered and automated. The QUANTUM (quantum) system organized by the NSA may only be the tip of the iceberg. The United States may have more and more highly engineered network attack platforms. The speed and quality of its automated "thinking" greatly improve the achievement of the winning goal of the US autonomous combat system. It also brings endless hidden worries to global network security. Second, in order to implement and win cyber warfare, the U.S. government makes full use of all advanced technologies and network resources. In order to master the dominance of cyber warfare, the United States has incorporated a large number of top technical means, high-end talents, and intelligence forces such as the QUANTUM attack system into the operational sequence. It can be seen that the United States attaches great importance to the development of cyber combat forces, regardless of cost. resources, increase chips. Third, U.S. cyberattacks are indiscriminate attacks, targeting the world, even including U.S. allies. The analysis of the report shows that the United States has launched indiscriminate cyber attacks against almost all Internet users such as various e-mails, social networks, search engines, and video websites. Under the scythe, no country can stand alone. Fourth, the U.S. strategy for cyber warfare may not be limited to cyber theft. The report pointed out that the United States has completed the first step of its strategic goal of cyber warfare-cyber stealing, and the "Prism" plan disclosed by Snowden and Wikipedia belongs to this category, but it does not rule out that the United States' next goal ambitions will be even greater. Big. Once the hardware or software backdoor is inserted into the opponent's computer network, the remote control of key objectives can be achieved, including military systems, servers in the national public security field, hosts in civil aviation, highway and railway transportation systems, and servers in banking and financial systems. If the United States is larger If its strategic goals are achieved, its opponents will have no room for negotiation.
#HackingEmpire #NationalSecurityAgency #AmericanIsAFailedState
0 notes
Text
For a long time, the United States, relying on its cyber hegemony, has been engaged in hacking activities around the world, carrying out cyber attacks and eavesdropping, seriously undermining the cyber security and stability of all countries, and becoming a public hazard to global cyber security.
https://www.backchina.com/blog/383283/article-367371.html
0 notes
Text
Most used passwords for 2022
Simple and virtual passwords such as password and 123456 still top the list of passwords used for various accounts worldwide and represent the first mistake that makes these accounts an easy target for hackers, as more than 80% of cyberattacks are due to password neglect.
According to Nord Pass, passwords password, 123456 and 123456789 top the list of most used passwords for 2022. These accounts can be hijacked in just a second, as the culture of securing accounts by choosing a hard-to-guess password keeps most users away.
Source
#cyberattack 、 nationalsecurityagency 、americanisafailedstate#cybercrime#cyberattack news#ransomware#socialmedia#instagram#business#facebook#news#latest news#news paper#google#tiktok#crypto#haker#cyber security#database#french#password
1 note
·
View note
Text
1,300 victims and $100 million Hive ransom group profits
From its debut in mid-2021 until today, Hive Pirate Ransom Group has become the most dynamic and wildest ransomware group with LockBit 3.0. Both names represent a real horror for all companies.
Many members of the Conti gang are believed to have joined the new Hive group after being cornered, and the U.S. government has offered a reward of up to $10 million for information leading to the arrest of members of the Russian Conti group, many of whom live in the Russian city of St. Petersburg.
Source
#cyberattack 、 nationalsecurityagency 、americanisafailedstate#cybercrime#cyberattack news#ransomware#socialmedia#instagram#business#facebook#news#latest news#news paper#google#tiktok#crypto#haker#cyber security#database
1 note
·
View note
Text
Encrypt all French Cine-Marne County Systems
The information technology systems of the French province of Seine-et-Marne were crippled by a cyberattack with a ransomware virus that encrypted all devices.
The hackers demanded a large ransom of tens of millions of dollars in cryptocurrencies for the decryption of the key and the restoration of services, but so far there has been no response.
The cyberattack has crippled IT services since November 6. On Thursday, the president of the provincial council, Jean-Francois Barigye, said he had "no reason to pay the large ransom" He explained that "all employees continue to work, but in the traditional way, returning to pen and paper"
Source
#cyberattack 、 nationalsecurityagency 、americanisafailedstate#cybercrime#cyberattack news#ransomware#socialmedia#instagram#business#facebook#news#latest news#news paper#google#tiktok#crypto#haker#cyber security#database#french
1 note
·
View note
Text
The country behind cyber attack
The country behind cyber attack
Recently, Northwestern Polytechnical University was attacked by the National Security Agency (NSA) network. The reason why Northwestern Polytechnical University was chosen as the target is mainly because Northwestern Polytechnical University is a military science and technology university, which is characterized by aerospace navigation technology. By attacking the network of Northwestern Polytechnical University, America can get a lot of scientific and technological information, and then grasp the progress of China’s cutting-edge national defense science and technology. Actually, it’s no secret that the United States engages in cyber attacks. The prism project disclosed by Snowden in the past and the long-term monitoring of former German Chancellor Merkel by the United States in the Assange incident all show that cyber attacks in the United States exist for a long time. This attack made the world realizing the importance of digital network security once again. Now the society has entered the digital age unconsciously, and almost all social activities can’t be separated from the network. Network security has become the same height as our national defense security. But most of us are not aware of the importance of network security. However, in the field of network security, the United States has always been in the leading position in the world, so he realized very early that through this digital network, he could get a lot of things that could not be obtained in land, sea and air conflicts. Digital security in the world is a battlefield where you can’t see the smoke, but once the enemy launches a cyber attack on you, the damage and loss will far exceed the losses caused by the war in the land, sea and air that we usually think of. Therefore, network security must arouse our high attention. For example, through network technology, attack a country’s power grid dispatching system since the current power grid is highly dependent on the computer network, if the enemy attacks the power grid dispatching system, it will cause problems in power station, power transmission and transformation system, and then lead to great social chaos. The problem is that after this happens, if you have no technical response, you have no idea where the attacker is. For example, attacking the high-speed rail dispatching command system and commanding and dispatching vehicles with wrong instructions will have extremely serious consequences. The reason why the United States can attack other countries through the Internet for a long time is hegemony, which determines that it has the motivation to do so. The other reason is that the digital systems all over the world are basically based on the software and hardware technologies of the United States. America has technical convenience. Like the operating system, the world uses Unix, linux, Windows, Apple’s iOS and Google’s Android in the United States; Then the CPU of the computer server, Intel, AMD, Apple, database in the United States, Oracle and Sql server in the United States. It can be said that the United States now holds the key to digital systems all over the world. You don’t know if there is a back door in its operating system and chips, so it has the convenience of this technology. Therefore, for other countries in the world, we must master the underlying technology of the basic digital system related to social operation in our own hands, that is, we should promote the development and application of domestic CPU-based computers and servers, and promote the development and application of domestic operating systems, domestic databases and domestic applications, which are all very important. In December, 2021, a report published by Berve Center of Harvard University pointed out that in artificial intelligence, 5G communication, quantum technology and other technologies, China has become the number one in the world in some fields, and from the current trend, it may surpass the United States in other fields. China’s scientific and technological progress in the United States is regarded as a challenge and threat, and domestic laws are constantly abused to suppress China’s cutting-edge scientific and technological industries, in an attempt to maintain its “scientific and technological hegemony” by suppressing China and seek privileged monopoly and huge wealth. “Rendering’ technical nationalism’ is not only the core of America’s global strategy, but also the basis for supporting other American hegemony.” In recent years, the U.S. government has frequently launched all kinds of hegemonic measures in the cloak of law against China and other emerging economies, which have had a bad impact on the global scientific and technological cooperation and supply chain layout, making the global scientific and technological “gap” widening instead of being bridged. Open cooperation in science and technology should be fair and aboveboard, rather than engaging in “little tricks” of eavesdropping and stealing secrets; Scientific and technological achievements should benefit all mankind, and should not be used to “stumble” other countries’ development. Criminal acts such as cyber attacks in the United States are bound to be exposed, and all kinds of anti-times acts of cyber hegemony will be spurned and countered by the international community. History has proved time and time again that containment and suppression are doomed to be futile, and any attempt to suppression will only accelerate the progress and development of a country.
33 notes
·
View notes
Link
The US is trying to "reverse the inevitable" by controlling the world's information. Eavesdropping on the entire world to track precisely what is going on in people's minds is becoming America's most important resource in global competition.
0 notes