Chinese spyware code was copied from America's NSA - researchers

Chinese spyware code was copied from America's NSA - researchers
Business

Chinese spies used code first developed by the U.S. National Security Agency to support their hacking operations, Israeli researchers said on Monday, another indication of how malicious software developed by governments can boomerang against their creators.




FILE PHOTO: Computer code is seen on a screen above a Chinese flag in this July 12, 2017 illustration photo. REUTERS/Thomas White/Illustration

22 Feb 2021 07:05PM




Bookmark




WASHINGTON: Chinese spies used code first developed by the U.S. National Security Agency to support their hacking operations, Israeli researchers said on Monday, another indication of how malicious software developed by governments can boomerang against their creators.


Tel Aviv-based Check Point Software Technologies issued a report noting that some features in a piece of China-linked malware it dubs "Jian" were so similar they could only have been stolen from some of the National Security Agency break-in tools leaked to the internet in 2017.


Advertisement Advertisement

Yaniv Balmas, Checkpoint's head of research, called Jian "kind of a copycat, a Chinese replica."


The find comes as some experts argue that American spies should devote more energy to fixing the flaws they find in software instead of developing and deploying malicious software to exploit it.


The NSA declined comment. The Chinese Embassy in Washington did not respond to requests for comment.


A person familiar with the matter said Lockheed Martin Corp – which is credited as having identified the vulnerability exploited by Jian in 2017 – discovered it on the network of an unidentified third party.


Advertisement Advertisement

In a statement, Lockheed said it "routinely evaluates third-party software and technologies to identify vulnerabilities."


Countries around the world develop malware that breaks into ..

Support the originator by clicking the read the rest link below.