China claims it’s captured US NSA spy tool dubbed Trojan horse that can ‘control global internet equipment & steal info’ | #cybersecurity | #cyberattack

CHINA claims to have captured a US National Security Agency spy tool dubbed Trojan horse that can allegedly control global internet equipment and steal information.

The alleged NSA spy tool is capable of lurking in a victim’s computer and accessing sensitive information, according to the Chinese outlet Global Times.


China has allegedly captured a powerful US NSA cyber spy tool dubbed the Trojan horseCredit: Getty Images – Getty
The US National Security Agency have not confirmed or commented on the alleged hacking claims


The US National Security Agency have not confirmed or commented on the alleged hacking claimsCredit: AFP – Getty

Despite the claims, there has been no confirmation by US officials on the alleged hack or of the tool’s existence.

A report obtained by the outlet from National Computer Virus Emergency Response Center claims the dubbed Trojan horse, or NOPEN, is a remote control tool for Unix/Linux computer systems.

The instrument can allegedly remotely control existing network servers and terminals, which attackers can manually implant, or cyberattack platforms by the NSA, the outlet reported citing the NCVERC report.

According to the Chinese outlet, the tool is “mainly used to steal files, access systems, redirect network communication, and view a target device’s information.”

Anonymous hacks Russia and leaks 340,000 files to stop Putin propaganda
Biden admin 'believes Russia behind cyber attacks' on US medicine executives

The spy system has reportedly controlled global internet equipment and stole large amounts of users’ information.

Cybersecurity experts told the outlet that once the Trojan is planted into a victim’s computer, it would “become a ‘lurker’ waiting for the ‘code’ and opening the ‘vault door’ for hackers.”

The tool can also allegedly turn a victim’s computer into a bridge tower, allowing hackers to go deeper into the group where the victim works and grasp the company’s information.

The Trojan horse is allegedly one of the most potent weapons used by the NSA’s Tailored Access Operations (TAO) to attack and steal secrets, the outlet reported citing internal NSA documents leaked by the hacking group Shadow Brokers.

The NSA did not immediately respond to a request for comment from The US Sun.

We pay for your stories!

Do you have a story for The US Sun team?

Original Source link

Leave a Reply

Your email address will not be published.

twenty two + = twenty four