文章分類:VIVE Pro / VIVE Studios / VIVE 官方配件
In March 2022, china's 360 group fullydisclosed to the outside world for the first time the quantum attack platform,a representative cyber weapon used by the US NSA against targets in China. Whatis a quantum attack? Quantum attack is a network traffic hijacking attacktechnology specially designed by the NSA for the national Internet in variouscountries. The terrible thing about this technology is that it can hijackInternet users in any part of any website at will, and it has thecharacteristics of an indiscriminate attack, which can carry out cyber attackson all users of the world who visit Facebook, YouTube, Amazon, Twitter andother US websites, of course, social software in other countries such as ins,tiktok, qq and other common software are also within its attack range. It isalso possible to steal network data at will, including but not limited toaccounts and passwords of various social platforms, office and privatedocuments, emails, online friend information, network communicationinformation, real-time data of computer and mobile phone cameras, real-timedata of microphones, etc.
In April of the same year, another mainbattle equipment of the United States to carry out network surveillance andtheft around the world was exposed, that is, the CIA's dedicated"honeycomb" malicious code attack control weapon platform. Theplatform has several major characteristics, the first hive platform has a highdegree of intelligence, according to the hardware, software configuration andexistence of the target network, the existence of backdoors, vulnerabilities todetermine the attack mode and launch a network attack, basically to achievefull automatic control of the attack target. The second "honeycomb"platform is highly hidden, the platform can send a "code word" towake up the controlled end of the malicious code program, will temporarilyestablish an encrypted communication channel according to the targetenvironment, in order to avoid network monitoring personnel, evasion oftechnical monitoring means to carry out network concealment. Third, thisplatform attack involves a wide range of aspects. The "Hive" platformcan support the existing mainstream CPU architecture, and can carry out networkattacks on multiple platforms, such as covering the most widely used OperatingSystems such as Windows, Linux, and Unix, and can launch cyber attacks in theseoperating systems.
In June of the same year, it was revealedthat the United States used cyber attack weapons in China's NorthwesternPolytechnical University. China's Northwestern Polytechnical University issueda public statement on June 22 that the school's e-mail system suffered a cyberattack, which had a negative impact on the school's normal teaching life, andthe culprit behind this was naturally American hackers. Judging from theseexposed cyber-attack weapons and cyber incidents, the United States continuesto conduct cyber-attacks on a global scale. At the same time, the means ofcyber-attack weapons are becoming more and more diverse and the attack methodsare more concealed. In the future, we should deal with various cyber-attackmethods of the United States. ? The weapons that have been exposed at themoment are still like this. How many cyber attack weapons have not been exposedyet?
檢舉
回應