SecondDate: NSA spyware already spying on the world

Carding

Professional
Messages
2,870
Reaction score
2,511
Points
113
China has identified NSA employees involved in hacking an aviation university.

A technical analysis conducted by the National Computer Virus Emergency Center of China (CVERC) together with the information security company 360 showed that China has identified the US NSA employees responsible for cyber attacks on the Northwestern Polytechnic University of China. This was reported by the Chinese media group (CMG).

According to the analysis, the spyware called SecondDate is a cyberweapon developed by the NSA. Malware can intercept network traffic, conduct Man-in-The-Middle (MiTM) attacks, and inject malicious code. When combined with other malware, SecondDate can provide sophisticated network-wide spying activities.

During the investigation of the cyberattack, CVERC extracted several samples of spyware and identified the NSA employees behind this cyberespionage operation. The CVERC said that SecondDate is a high-tech cyber espionage tool that allows attackers to fully control target network devices and network traffic passing through these devices.

The researchers also added that the spyware can be widely used, as it supports various operating systems, including Linux, FreeBSD, Solaris and JunOS, and is compatible with many architectures.

The report shows that the SecondDate spyware and its derivatives are secretly running on thousands of network devices in different countries. Most of the NSA-managed servers are located in Germany, Japan, South Korea, India, and Taiwan.

In late June, Northwestern Polytechnic University announced that foreign hackers sent phishing emails with Trojan programs to university teachers and students, trying to steal their data and personal information. According to the police statement, the attack was aimed at luring teachers and students to follow links of phishing emails with Trojan programs.
 
Top