The European Tribune is a forum for thoughtful dialogue of European and international issues. You are invited to post comments and your own articles.
Please REGISTER to post.
Exclusive: `Concealed, adaptable' weapon of NSA's cyberattack on leading Chinese aviation university exposed | Global Times | Cyberattack was launched on the email system of Northwestern Polytechnical University in Northwest China's Shaanxi Province - well-known for its aviation, aerospace and navigation studies. On September 5, a Chinese technical team announced that by extracting many trojans samples from internet terminals of Northwestern Polytechnical University, under the support of European and South Asian partners, it initially identified that the cyberattack to the university was conducted by the Tailored Access Operations (TAO) (Code S32) under the Data Reconnaissance Bureau (Code S3) of the Information Department (Code S) of US' NSA. Aiming at Northwestern Polytechnical University, TAO used 41 types of weapons to steal the core technology data including key network equipment configuration, network management data, and core operational data. The technical team discovered more than 1,100 attack links had infiltrated inside the university and more than 90 operating instruction sequences, which stole multiple network device configuration files, and other types of logs and key files, the team said.
Cyberattack was launched on the email system of Northwestern Polytechnical University in Northwest China's Shaanxi Province - well-known for its aviation, aerospace and navigation studies.
On September 5, a Chinese technical team announced that by extracting many trojans samples from internet terminals of Northwestern Polytechnical University, under the support of European and South Asian partners, it initially identified that the cyberattack to the university was conducted by the Tailored Access Operations (TAO) (Code S32) under the Data Reconnaissance Bureau (Code S3) of the Information Department (Code S) of US' NSA.
Aiming at Northwestern Polytechnical University, TAO used 41 types of weapons to steal the core technology data including key network equipment configuration, network management data, and core operational data. The technical team discovered more than 1,100 attack links had infiltrated inside the university and more than 90 operating instruction sequences, which stole multiple network device configuration files, and other types of logs and key files, the team said.
by Frank Schnittger - Jan 26 1 comment
by Frank Schnittger - Jan 22 3 comments
by Cat - Jan 25 23 comments
by Oui - Jan 9 21 comments
by Frank Schnittger - Jan 13 28 comments
by gmoke - Jan 20
by Oui - Jan 15 90 comments
by gmoke - Jan 7 13 comments
by gmoke - Jan 29
by Oui - Jan 2729 comments
by Frank Schnittger - Jan 261 comment
by Cat - Jan 2523 comments
by Frank Schnittger - Jan 223 comments
by Oui - Jan 2110 comments
by Oui - Jan 21
by Oui - Jan 20
by Oui - Jan 1839 comments
by Oui - Jan 1590 comments
by Oui - Jan 144 comments
by Frank Schnittger - Jan 1328 comments
by Oui - Jan 1215 comments
by Oui - Jan 1120 comments
by Oui - Jan 1031 comments
by Oui - Jan 921 comments
by NBBooks - Jan 810 comments
by Oui - Jan 717 comments
by gmoke - Jan 713 comments