{"id":136875,"date":"2022-03-15T02:22:56","date_gmt":"2022-03-15T09:22:56","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/03\/exclusive-china-captures-powerful-us-nsa-cyberspy-tool"},"modified":"2022-03-15T02:22:56","modified_gmt":"2022-03-15T09:22:56","slug":"exclusive-china-captures-powerful-us-nsa-cyberspy-tool","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/03\/exclusive-china-captures-powerful-us-nsa-cyberspy-tool","title":{"rendered":"Exclusive: China captures powerful US NSA cyberspy tool"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/exclusive-china-captures-powerful-us-nsa-cyberspy-tool.jpg\"><\/a><\/p>\n<p>China captured a spy tool deployed by the US National Security Agency, which is capable of lurking in a victim\u2019s computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of users\u2019 information, according to a report the Global Times obtained from the National Computer Virus Emergency Response Center exclusively on Monday.<\/p>\n<p>According to the report, the Trojan horse, \u201cNOPEN,\u201d is a remote control tool for Unix\/Linux computer systems. It is mainly used for stealing files, accessing systems, redirecting network communication, and viewing a target device\u2019s information.<\/p>\n<p>Through technical analysis, the center believes that the \u201cNOPEN\u201d Trojan horse is characterized by complex technology, comprehensive functions and strong concealment, which can fit a variety of processor architectures and operating systems. It can also collaborate with other cyber weapons and is a typical tool used for cyber espionage.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>China captured a spy tool deployed by the US National Security Agency, which is capable of lurking in a victim\u2019s computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of users\u2019 information, according to a report the Global Times obtained from the National Computer Virus Emergency [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,34,418],"tags":[],"class_list":["post-136875","post","type-post","status-publish","format-standard","hentry","category-biotech-medical","category-cybercrime-malcode","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/136875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=136875"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/136875\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=136875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=136875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=136875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}