Chinese spies used code first developed by the U.S. National Security Agency<\/a> to support their hacking operations, Israeli researchers said on Monday, another indication of how malicious software<\/a> developed by governments can boomerang against their creators.

Tel Aviv-based Check Point Software Technologies issued a report noting that some features in a piece of China-linked malware it dubs \"Jian\" were so similar they could only have been stolen from some of the National Security Agency break-in tools leaked to the
internet<\/a> in 2017.

Yaniv Balmas, Checkpoint's head of research, called Jian \"kind of a copycat, a Chinese replica.\"

The find comes as some experts argue that American spies should devote more energy to fixing the flaws they find in software instead of developing and deploying malicious software to exploit it.

The
NSA<\/a> declined comment. The Chinese Embassy in Washington did not respond to requests for comment.

A person familiar with the matter said
Lockheed Martin<\/a> Corp – which is credited as having identified the vulnerability exploited by Jian in 2017 – discovered it on the network of an unidentified third party.

In a statement, Lockheed said it \"routinely evaluates third-party software and technologies to identify vulnerabilities.\"

Countries around the world develop malware that breaks into their rivals' devices by taking advantage of flaws in the software that runs them. Every time spies discover a new flaw they must decide whether to quietly exploit it or fix the issue to thwart rivals and rogues.

That dilemma came to public attention between 2016 and 2017, when a mysterious group calling itself the \"Shadow Brokers\" published some of the NSA's most dangerous code to the internet, allowing cybercriminals and rival nations to add American-made digital break-in tools to their own arsenals.

How the Jian malware analyzed by Checkpoint was used is not clear. In an advisory published in 2017, Microsoft Corp suggested it was linked to a Chinese entity it dubs \"Zirconium,\" which last year was accused of targeting U.S. election-related organizations and individuals, including people associated with President
Joe Biden<\/a>'s campaign.

Checkpoint says Jian appears to have been crafted in 2014, at least two years before the Shadow Brokers made their public debut. That, in conjunction with research published in 2019 by Broadcom Inc-owned cybersecurity firm
Symantec<\/a> about a similar incident, suggests the NSA has repeatedly lost control of its own malware over the years.

Checkpoint's research is thorough and \"looks legit,\" said Costin Raiu, a researcher with Moscow-based antivirus firm
Kaspersky Lab<\/a>, which has helped dissect some of the NSA's malware.

Balmas said a possible takeaway from his company's report was for spymasters weighing whether to keep software flaws secret to think twice about using a vulnerability for their own ends.

\"Maybe it's more important to patch this thing and save the world,\" Balmas said. \"It might be used against you.\"
<\/p><\/body>","next_sibling":[{"msid":81164120,"title":"Honor to launch newly designed MagicBook laptop: Report","entity_type":"ARTICLE","link":"\/news\/honor-to-launch-newly-designed-magicbook-laptop-report\/81164120","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[{"msid":"81153290","title":"Check Point Software","entity_type":"IMAGES","seopath":"news\/defence\/chinese-spyware-code-was-copied-from-americas-nsa-researchers\/check-point-software","category_name":"Chinese spyware code was copied from America's NSA: Researchers","synopsis":"Gil Shwed, Chief Executive of Network security provider Check Point Software Technologies, speaks during the annual Cyberweek conference at Tel Aviv University, Israel, June 20, 2016","thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-234073\/81153290.cms?width=150&height=112","link":"\/image\/defence\/chinese-spyware-code-was-copied-from-americas-nsa-researchers\/check-point-software\/81153290"},{"msid":"81123401","title":"US expresses concern over China's recently enacted Coast Guard law","entity_type":"ARTICLE","seopath":"news\/defence\/us-expresses-concern-over-chinas-recently-enacted-coast-guard-law","category_name":"Defence","synopsis":"Language in that law, including text allowing the coast guard to destroy other countries' economic structures and to use force in defending China's maritime claims in disputed areas, strongly implies this law could be used to intimidate the maritime neighbours of China, Price said.","thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-204949\/81123401.cms?width=150&height=112","link":"\/news\/defence\/us-expresses-concern-over-chinas-recently-enacted-coast-guard-law\/81123401"},{"msid":"81110535","title":"Chinese fighters buzz Taiwan's air zone as it appoints new defence minister","entity_type":"ARTICLE","seopath":"news\/defence\/chinese-fighters-buzz-taiwans-air-zone-as-it-appoints-new-defence-minister","category_name":"Defence","synopsis":"Beijing, which claims Taiwan as Chinese territory, says it is responding to what it calls \"collusion\" between Taipei and Washington, Taiwan's main international backer and weapons supplier.","thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-120834\/81110535.cms?width=150&height=112","link":"\/news\/defence\/chinese-fighters-buzz-taiwans-air-zone-as-it-appoints-new-defence-minister\/81110535"},{"msid":"81106664","title":"US says it is willing to sit down for talks with Iran and other nations on nuclear deal","entity_type":"ARTICLE","seopath":"news\/defence\/us-says-it-is-willing-to-sit-down-for-talks-with-iran-and-other-nations-on-nuclear-deal","category_name":"Defence","synopsis":"P5+1 include the five permanent members of the Security Council -- namely China, France, Russia, the United Kingdom, and the United States-- plus Germany, who during the Obama administration had entered into an agreement with Iran.","thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-89108\/81106664.cms?width=150&height=112","link":"\/news\/defence\/us-says-it-is-willing-to-sit-down-for-talks-with-iran-and-other-nations-on-nuclear-deal\/81106664"}],"msid":81164156,"entity_type":"ARTICLE","title":"Chinese spyware code was copied from America's NSA: Researchers","synopsis":"The find comes as some experts argue that American spies should devote more energy to fixing the flaws they find in software instead of developing and deploying malicious software to exploit it.","titleseo":"telecomnews\/chinese-spyware-code-was-copied-from-americas-nsa-researchers","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":176,"shares":0,"engagementtimems":692000},"Alttitle":{"minfo":""},"artag":"Reuters","artdate":"2021-02-23 08:17:08","lastupd":"2021-02-23 08:17:46","breadcrumbTags":["NSA","national security agency","US China","malicious software","Lockheed Martin","Joe Biden","Symantec","international","Kaspersky Lab","Internet"],"secinfo":{"seolocation":"telecomnews\/chinese-spyware-code-was-copied-from-americas-nsa-researchers"}}" data-authors="[" "]" data-category-name="" data-category_id="" data-date="2021-02-23" data-index="article_1">

中国间谍软件代码复制美国国家安全局的:研究人员

找到之际,一些专家认为,美国间谍应该投入更多的精力去修复他们发现软件缺陷,而不是利用恶意软件开发和部署。

  • 更新于2021年2月23日08:17点坚持
阅读: 100年行业专业人士
读者的形象读到100年行业专业人士

中国间谍使用代码首先由美国开发的国家安全局支持他们的黑客行动,以色列研究人员周一表示,另一个迹象恶意软件由政府可以回飞棒反对他们的创造者。

Tel Aviv-based检查软件技术发布了一份报告指出,一些功能的中国与恶意软件它配音“剑”是如此相似,他们只能被盗的一些国家安全局磨合工具泄露给了互联网在2017年。

Yaniv balma,检查点的研究,被称为剑”的山寨,中国复制品。”

广告
找到之际,一些专家认为,美国间谍应该投入更多的精力去修复他们发现软件缺陷,而不是利用恶意软件开发和部署。

国家安全局拒绝置评。中国驻华盛顿大使馆没有回应记者的置评请求。

一个知情人士说洛克希德·马丁公司集团——这被认为是在确定了脆弱性利用剑在2017年发现了一位身份不明的第三方网络。

洛克希德公司在一份声明中表示,它“定期评估第三方软件和技术来识别漏洞。”

世界各国发展恶意软件破坏到竞争对手的设备利用软件运行的缺陷。每一次间谍发现新的缺陷他们必须决定是否利用它阻止竞争对手和盗贼或解决问题。

,2016年和2017年之间的困境引起了公众的关注,在一个神秘的自称“影子经纪人”发表的一些国家安全局最危险的代码到互联网,允许网络罪犯和竞争对手国家美国制造的数字闯入工具添加到自己的核武库。

剑的恶意软件分析了检查点使用还不清楚。在2017年出版的一个顾问,微软(msft . o:行情)建议与中国实体配音“锆,”去年被指控针对美国与选举有关的组织和个人,包括人与总统有关乔•拜登(Joe Biden)的运动。

广告
检查点说剑似乎是2014年精心制作,至少前两年影子经纪人公开亮相。,与在2019年发表的研究网络安全的Broadcom viab . n公司赛门铁克对类似的事件,表明美国国家安全局一再失去了控制自己的恶意软件。

检查点的研究并不深入,说:“看起来合法的,损失Raiu,与莫斯科杀毒公司研究员卡巴斯基实验室,帮助分析了一些国家安全局的恶意软件。

balma说可能外卖从他公司的报告是间谍头目权衡是否保密软件缺陷考虑利用漏洞为自己的目的。

“也许更重要的是修补这个东西和拯救世界,”balma说道。“它可能被用来对付你。”

  • 发布于2021年2月23日08:17点坚持
是第一个发表评论。
现在评论

加入2 m +行业专业人士的社区

订阅我们的通讯最新见解与分析。乐动扑克

下载ETTelec乐动娱乐招聘om应用

  • 得到实时更新
  • 保存您最喜爱的文章
扫描下载应用程序

Chinese spies used code first developed by the U.S. National Security Agency<\/a> to support their hacking operations, Israeli researchers said on Monday, another indication of how malicious software<\/a> developed by governments can boomerang against their creators.

Tel Aviv-based Check Point Software Technologies issued a report noting that some features in a piece of China-linked malware it dubs \"Jian\" were so similar they could only have been stolen from some of the National Security Agency break-in tools leaked to the
internet<\/a> in 2017.

Yaniv Balmas, Checkpoint's head of research, called Jian \"kind of a copycat, a Chinese replica.\"

The find comes as some experts argue that American spies should devote more energy to fixing the flaws they find in software instead of developing and deploying malicious software to exploit it.

The
NSA<\/a> declined comment. The Chinese Embassy in Washington did not respond to requests for comment.

A person familiar with the matter said
Lockheed Martin<\/a> Corp – which is credited as having identified the vulnerability exploited by Jian in 2017 – discovered it on the network of an unidentified third party.

In a statement, Lockheed said it \"routinely evaluates third-party software and technologies to identify vulnerabilities.\"

Countries around the world develop malware that breaks into their rivals' devices by taking advantage of flaws in the software that runs them. Every time spies discover a new flaw they must decide whether to quietly exploit it or fix the issue to thwart rivals and rogues.

That dilemma came to public attention between 2016 and 2017, when a mysterious group calling itself the \"Shadow Brokers\" published some of the NSA's most dangerous code to the internet, allowing cybercriminals and rival nations to add American-made digital break-in tools to their own arsenals.

How the Jian malware analyzed by Checkpoint was used is not clear. In an advisory published in 2017, Microsoft Corp suggested it was linked to a Chinese entity it dubs \"Zirconium,\" which last year was accused of targeting U.S. election-related organizations and individuals, including people associated with President
Joe Biden<\/a>'s campaign.

Checkpoint says Jian appears to have been crafted in 2014, at least two years before the Shadow Brokers made their public debut. That, in conjunction with research published in 2019 by Broadcom Inc-owned cybersecurity firm
Symantec<\/a> about a similar incident, suggests the NSA has repeatedly lost control of its own malware over the years.

Checkpoint's research is thorough and \"looks legit,\" said Costin Raiu, a researcher with Moscow-based antivirus firm
Kaspersky Lab<\/a>, which has helped dissect some of the NSA's malware.

Balmas said a possible takeaway from his company's report was for spymasters weighing whether to keep software flaws secret to think twice about using a vulnerability for their own ends.

\"Maybe it's more important to patch this thing and save the world,\" Balmas said. \"It might be used against you.\"
<\/p><\/body>","next_sibling":[{"msid":81164120,"title":"Honor to launch newly designed MagicBook laptop: Report","entity_type":"ARTICLE","link":"\/news\/honor-to-launch-newly-designed-magicbook-laptop-report\/81164120","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[{"msid":"81153290","title":"Check Point Software","entity_type":"IMAGES","seopath":"news\/defence\/chinese-spyware-code-was-copied-from-americas-nsa-researchers\/check-point-software","category_name":"Chinese spyware code was copied from America's NSA: Researchers","synopsis":"Gil Shwed, Chief Executive of Network security provider Check Point Software Technologies, speaks during the annual Cyberweek conference at Tel Aviv University, Israel, June 20, 2016","thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-234073\/81153290.cms?width=150&height=112","link":"\/image\/defence\/chinese-spyware-code-was-copied-from-americas-nsa-researchers\/check-point-software\/81153290"},{"msid":"81123401","title":"US expresses concern over China's recently enacted Coast Guard law","entity_type":"ARTICLE","seopath":"news\/defence\/us-expresses-concern-over-chinas-recently-enacted-coast-guard-law","category_name":"Defence","synopsis":"Language in that law, including text allowing the coast guard to destroy other countries' economic structures and to use force in defending China's maritime claims in disputed areas, strongly implies this law could be used to intimidate the maritime neighbours of China, Price said.","thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-204949\/81123401.cms?width=150&height=112","link":"\/news\/defence\/us-expresses-concern-over-chinas-recently-enacted-coast-guard-law\/81123401"},{"msid":"81110535","title":"Chinese fighters buzz Taiwan's air zone as it appoints new defence minister","entity_type":"ARTICLE","seopath":"news\/defence\/chinese-fighters-buzz-taiwans-air-zone-as-it-appoints-new-defence-minister","category_name":"Defence","synopsis":"Beijing, which claims Taiwan as Chinese territory, says it is responding to what it calls \"collusion\" between Taipei and Washington, Taiwan's main international backer and weapons supplier.","thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-120834\/81110535.cms?width=150&height=112","link":"\/news\/defence\/chinese-fighters-buzz-taiwans-air-zone-as-it-appoints-new-defence-minister\/81110535"},{"msid":"81106664","title":"US says it is willing to sit down for talks with Iran and other nations on nuclear deal","entity_type":"ARTICLE","seopath":"news\/defence\/us-says-it-is-willing-to-sit-down-for-talks-with-iran-and-other-nations-on-nuclear-deal","category_name":"Defence","synopsis":"P5+1 include the five permanent members of the Security Council -- namely China, France, Russia, the United Kingdom, and the United States-- plus Germany, who during the Obama administration had entered into an agreement with Iran.","thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-89108\/81106664.cms?width=150&height=112","link":"\/news\/defence\/us-says-it-is-willing-to-sit-down-for-talks-with-iran-and-other-nations-on-nuclear-deal\/81106664"}],"msid":81164156,"entity_type":"ARTICLE","title":"Chinese spyware code was copied from America's NSA: Researchers","synopsis":"The find comes as some experts argue that American spies should devote more energy to fixing the flaws they find in software instead of developing and deploying malicious software to exploit it.","titleseo":"telecomnews\/chinese-spyware-code-was-copied-from-americas-nsa-researchers","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":176,"shares":0,"engagementtimems":692000},"Alttitle":{"minfo":""},"artag":"Reuters","artdate":"2021-02-23 08:17:08","lastupd":"2021-02-23 08:17:46","breadcrumbTags":["NSA","national security agency","US China","malicious software","Lockheed Martin","Joe Biden","Symantec","international","Kaspersky Lab","Internet"],"secinfo":{"seolocation":"telecomnews\/chinese-spyware-code-was-copied-from-americas-nsa-researchers"}}" data-news_link="//www.iser-br.com/news/chinese-spyware-code-was-copied-from-americas-nsa-researchers/81164156">