In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-03 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >
Share
Shulou(Shulou.com)12/24 Report--
Thanks to CTOnews.com netizens MagicPants and vegetable Dog for the clue delivery! CTOnews.com, November 27, the official account of the Ministry of State Security released news today that at present, with the rapid popularization and deepening of the application of network technology in our country, the network technology service industry has become a new target for overseas espionage agencies to infiltrate secrets, evade our network security supervision and protection system, and implement cyber espionage.
Xiao Wang is an engineer engaged in network technical services. at the beginning of this year, a foreign software developer took the initiative to contact Xiao Wang and invited Xiao Wang to configure "digital signature certificates" and "antivirus software testing" for dozens of pieces of software. in order to "smoothly pass" my network security certification test, and promise to pay high remuneration.
As the communication deepened, the software developer further asked Xiao Wang to use the specified software and encrypted links to contact him, and his words were inconsistent and his behavior was abnormal. Xiao Wang realized that this foreign software developer is by no means an ordinary commercial organization, and providing it with "technical services" will enable software with security risks to bypass our network security supervision and enter the Chinese application market. However, driven by the temptation of economic interests, Xiao Wang was lucky enough to know the harm and established a partnership with the foreign software developer to provide "technical services" for dozens of his software.
"Heavenly net restores justice, but does not leak." According to the investigation, the real identity of the foreign software developer who established a "cooperative relationship" with Xiao Wang is an overseas espionage and intelligence agency. The software provided by Xiao Wang with "technical services" is bundled with special Trojan virus programs. Once clicked to run, it will invade and control computers, servers and other network equipment, and steal documents, materials and data. The spy intelligence agency used these "drug-carrying" software to carry out cyber attacks and secret theft activities against dozens of national defense and military industrial units and high-tech enterprises in China.
After ascertaining the situation, the state security organs promptly informed the relevant units and carried out disposal work in accordance with the law, thus avoiding major hazards and losses. Xiao Wang also paid the price for his "luck" and was given administrative punishment by the state security organs in accordance with the law.
CTOnews.com with a reminder from national security agencies:
Cyberspace seems invisible and hidden, but in fact it is full of espionage and secret warfare. Digital signatures, digital certificates, security tests, network domain names, cloud servers, e-mail and other network assets and services may be used by overseas espionage and intelligence agencies to carry out network attacks and secret theft activities.
Network service organizations and employees should be vigilant and open their eyes. When suspicious people put forward "special" requirements when purchasing technical support services, or discover illegal activities such as network attack, intrusion, interference, control, sabotage, etc., they should keep evidence in time, call 12339 to accept reports, or log on to the www.12339.gov.cn Internet report acceptance platform. Or report to the national security organs through the official Wechat account of the Ministry of State Security.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.