State-run CCTV said on Thursday that China’s National Computer Virus Emergency Response Centre, with help from Chinese antivirus company 360 Total Security, had discovered the identity of the National Security Agency (NSA) operative or operatives – the broadcaster did not specify how many or name them – after it extracted “multiple samples” of a spyware called “Second Date”.
It said the spyware was used in the cyberattack on Northwestern Polytechnical University in Shaanxi province.
The report said technical analysis showed that Second Date was a cyberespionage weapon developed by the NSA to sniff out and hijack network traffic and insert malicious codes.
Quoting senior engineer at the National Computer Virus Emergency Response Centre Du Zhenhua, it said software was a potent cyberespionage tool that enabled attackers to take control of target network devices and the data traffic flowing through them, and use them as a “forward base” for the next stage of attacks. It could run on various operating systems and was compatible with multiple architectures.
Du was quoted as saying the spyware was usually used in conjunction with various network device vulnerability attack tools from the NSA’s Office of Tailored Access Operations (TAO). The TAO, now renamed Computer Network Operations, is a cyberwarfare intelligence-gathering unit.
The report said that after global tracing, the Chinese team found “thousands of network devices” across the country were still infected by the spyware and its derivatives. It said they also found springboard servers remotely controlled by the NSA in Germany, Japan, South Korea, India and Taiwan.
On Thursday, the state security ministry said China had become “a major victim of high-level persistent threats online”, and vowed to strengthen the tracking, monitoring and prevention of cyberespionage, “effectively safeguarding” China’s network security, in a commentary published on its official WeChat account.
“[We] will have ‘digital spies’ reveal their true colours and have nowhere to hide!” the commentary said.
Without naming a specific country or agency, it said “dozens of intelligence agencies from different countries and regions” had carried out cyberattacks in China via specific agencies and “cover companies”. Besides directly carrying out cyberattacks, foreign spies also lured Chinese companies via outsourcing arrangements, paying for data and system loopholes, it said.
The commentary said these cyberattack targets extended beyond government agencies, with foreign spies and intelligence agencies aiming for “our critical information infrastructure and major infrastructure network systems and a … our universities, scientific research institutions, large enterprises, hi-tech companies and other institutions as well as corporate executives, experts and scholars”.