{"id":136183,"date":"2022-02-28T11:23:52","date_gmt":"2022-02-28T19:23:52","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/02\/how-china-built-a-one-of-a-kind-cyber-espionage-behemoth-to-last"},"modified":"2022-02-28T11:23:52","modified_gmt":"2022-02-28T19:23:52","slug":"how-china-built-a-one-of-a-kind-cyber-espionage-behemoth-to-last","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/02\/how-china-built-a-one-of-a-kind-cyber-espionage-behemoth-to-last","title":{"rendered":"How China built a one-of-a-kind cyber-espionage behemoth to last"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/how-china-built-a-one-of-a-kind-cyber-espionage-behemoth-to-last.jpg\"><\/a><\/p>\n<p>The \u201cmost advanced piece of malware\u201d that China-linked hackers have ever been known to use was revealed today. Dubbed Daxin, the stealthy back door was used in espionage operations against governments around the world for a decade before it was caught.<\/p>\n<p>But the newly discovered malware is no one-off. It\u2019s yet another sign that a decade-long quest to become a cyber superpower is paying off for China. While Beijing\u2019s hackers were once known for simple smash-and-grab operations, the country is now among the best in the world thanks to a strategy of tightened control, big spending, and an infrastructure for feeding hacking tools to the government that is unlike anything else in the world.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The \u201cmost advanced piece of malware\u201d that China-linked hackers have ever been known to use was revealed today. Dubbed Daxin, the stealthy back door was used in espionage operations against governments around the world for a decade before it was caught. But the newly discovered malware is no one-off. It\u2019s yet another sign that a [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1490],"tags":[],"class_list":["post-136183","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-government"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/136183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=136183"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/136183\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=136183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=136183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=136183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}