Spyware is the key!, New evidence! The mysterious hacker identity of the cyber attack on Western Polytechnic University has been locked down

Release time:Apr 16, 2024 21:08 PM

Recently, the National Computer Virus Emergency Response Center and 360 Company conducted a technical analysis of a spyware called "Second Date", and the analysis report showed that the software is a network spy weapon developed by the National Security Agency of the United States. It is reported that during the collaboration between the National Computer Virus Emergency Response Center and 360 Company in investigating the cyber attack on Northwestern Polytechnical University by the US National Security Agency, multiple samples of this spyware were successfully extracted, and the true identities of the US National Security Agency staff behind this cyber espionage operation were identified.

According to a technical analysis report, "Second Date" spyware is a network spy weapon developed by the US National Security Agency. The software can achieve malicious functions such as network traffic eavesdropping and hijacking, man in the middle attack, and inserting malicious code. When combined with other malicious software, it can complete complex network "spying" activities.

Du Zhenhua, Senior Engineer of the National Computer Virus Emergency Response Center: This software is a high-tech network espionage tool that allows attackers to fully take over the attacked network devices and the network traffic flowing through these network devices, thereby achieving long-term theft of hosts and users in the target network. At the same time, it can also serve as a "forward base" for the next stage of attacks, delivering more network attack weapons to the target network at any time.

According to experts, "second date" spyware has long resided on network boundary devices such as gateways, boundary routers, and firewalls. Its main functions include network traffic sniffing, network session tracking, traffic redirection hijacking, and traffic tampering. In addition, the "Second Date" spyware supports running on various operating systems and is compatible with multiple architectures, making it widely applicable.

Du Zhenhua, Senior Engineer of the National Computer Virus Emergency Response Center: This spyware is usually used in conjunction with various network device vulnerability attack tools targeting firewalls and network routers in specific intrusion action offices. Once the vulnerability attack is successful and the attacker successfully obtains control permissions of the target network device, they can implant this network spyware into the target network device.


Spyware is the key!, New evidence! The mysterious hacker identity of the cyber attack on Western Polytechnic University has been locked down

The report shows that the National Computer Virus Emergency Response Center and 360 Company, together with their partners in the industry, have carried out technical investigations around the world. After tracing the source layer by layer, they found that thousands of network devices all over the world are still secretly running "second date" spyware and its derivatives, and found springboard servers remotely controlled by the National Security Agency of the United States, most of which are distributed in Germany, Japan, South Korea, India and Taiwan, China, China.

Du Zhenhua, Senior Engineer of the National Computer Virus Emergency Response Center: With the joint cooperation of industry partners from multiple countries, our joint investigation work has made breakthrough progress. At present, the real identities of the National Security Agency personnel who launched a cyber attack against Northwestern Polytechnical University have been successfully identified.

Analysis Report on Spyware for "Second Date": Network Attack: The Real Identity of American Personnel Related to Northwestern Polytechnical University Locked

Recently, the National Computer Virus Emergency Response Center and 360 Company conducted a technical analysis on a "spy" software called "Second Date". This "spy" software targets gateway device platforms such as routers based on FreeBSD, Linux, Sun Solar, Juniper JunOS, etc. It can achieve malicious functions such as network traffic eavesdropping and hijacking, man in the middle attack, and inserting malicious code, thereby cooperating with other "spy" software to complete complex network "spy" activities.

According to internal NSA documents leaked by the Shadow Brokers, the malware is a network "spy" weapon developed by the US National Security Agency. "SecondDate" spyware is a specialized tool for man in the middle attacks, typically residing on boundary devices of the target network, sniffing network traffic and hijacking or tampering with specific network sessions as needed.


Spyware is the key!, New evidence! The mysterious hacker identity of the cyber attack on Western Polytechnic University has been locked down

During the collaboration between the National Computer Virus Emergency Response Center and 360 Company in investigating the cyber attack on Northwestern Polytechnical University by the US National Security Agency, multiple samples of this spyware were successfully extracted, and the true identities of the US National Security Agency staff behind this cyber espionage operation were identified.


1、 Basic information



The "Second Date" spyware is mainly deployed on target network boundary devices, secretly monitoring network traffic, and accurately selecting specific network sessions for redirection, hijacking, and tampering as needed.

Technical analysis has found that "SecondDate" spyware is a high-tech network spying tool. Developers should have a strong foundation in network technology, especially in network firewall technology, which is almost equivalent to installing a set of content filtering firewalls and proxy servers on the target network device, allowing attackers to fully take over the target network device and the network traffic flowing through it, thereby achieving long-term theft of other hosts and users in the target network, and serving as a "forward base" for attacks, ready to deliver more network attack weapons to the target network at any time.


2、 Specific functions




Spyware is the key!, New evidence! The mysterious hacker identity of the cyber attack on Western Polytechnic University has been locked down

The "Second Date" spyware stays on network boundary devices such as gateways, boundary routers, and firewalls for a long time, and can accurately filter and automatically hijack massive data traffic, achieving man in the middle attack function. Its main functions include network traffic sniffing, network session tracking, traffic redirection hijacking, traffic tampering, etc.


3、 Technical analysis



This "spyware" software targets network device platforms such as routers and firewalls. SecondDate supports distributed deployment and consists of server-side and client-side programs. Attackers implant client-side programs into target network devices through other means in advance, and then use server-side programs to command and control the client. The main workflow and technical analysis results are as follows:

Server side

The main function of the server-side is to establish a connection with the client and issue control rules, allowing the client to perform corresponding malicious operations. As shown in Table 1, Figure 1, Figure 2, and Figure 3.


Spyware is the key!, New evidence! The mysterious hacker identity of the cyber attack on Western Polytechnic University has been locked down

1. Connecting clients



Establish a connection with the client by specifying the client IP and port number in the command line parameters.

Figure 1 Establishing a connection with the client


2. Obtain the current status of the client



Figure 2 Obtaining Client Status Information


Spyware is the key!, New evidence! The mysterious hacker identity of the cyber attack on Western Polytechnic University has been locked down

3. Configure client rules



Figure 3: Configure Client Rules

As shown in Figure 3, attackers can filter network traffic by specifying source IP address, source port, destination IP address, destination port, protocol type, TCP flag, etc. They can also specify matching regular expression files to obtain traffic with specific content, and can insert files containing specific content into the traffic.

client

From the analysis results, it can be seen that after the client is implanted and configured with corresponding rules, it can run silently in the background of network devices. Attackers can use the server side for control or directly log in to the background of network devices for command control. As shown in Table 2, Figure 4, Figure 5, and Figure 6.


Spyware is the key!, New evidence! The mysterious hacker identity of the cyber attack on Western Polytechnic University has been locked down

1. Specify local port



Figure 4: Client specified local port


2. Execute corresponding operations according to instruction rules



Figure 5: Client Execution Control Instructions


3. Insert file




Spyware is the key!, New evidence! The mysterious hacker identity of the cyber attack on Western Polytechnic University has been locked down

Figure 6 Client Execution File Insertion Instruction


4. Instruction set



After analysis, the main instructions supported by the client and their functional descriptions are shown in Table 3.

The client instruction set is very rich and can achieve malicious operations such as content filtering of network traffic, man in the middle hijacking, and content injection.


4、 Usage environment




Spyware is the key!, New evidence! The mysterious hacker identity of the cyber attack on Western Polytechnic University has been locked down

The "Second Date" spyware supports running on various operating systems such as Linux, FreeBSD, Solaris, JunOS, and is compatible with multiple architectures such as i386, x86, x64, SPARC, and has a wide range of applications.


5、 Implantation method



"Second date" spyware is usually used in conjunction with various network device vulnerability attack tools targeting firewalls and routers in specific intrusion action offices. After successful vulnerability attacks and obtaining corresponding permissions, it is implanted into the target device.


6、 Using control methods



The "Second Date" spyware is divided into a server and a control end. The server is deployed on target network boundary devices and monitors and filters all traffic in real-time through underlying drivers; After the control end triggers the activation mechanism by sending specially constructed data packets, the server parses the reconnection IP address from the activation packet and actively reconnects. The network connection uses UDP protocol, with encrypted communication throughout the entire process and random communication ports. The control end can remotely configure the working mode and hijacking targets of the server, and select any target within the network to carry out man in the middle attacks according to actual needs.


Spyware is the key!, New evidence! The mysterious hacker identity of the cyber attack on Western Polytechnic University has been locked down

We carried out technical investigations with our industry partners around the world. After tracing the source layer by layer, we found that thousands of network devices all over the world are still secretly running "second date" spyware and its derivatives, and found that springboard servers remotely controlled by the National Security Administration of the United States, most of which are distributed in Germany, Japan, South Korea, India and Taiwan, China, China. With the joint efforts of industry partners from multiple countries, we have made significant breakthroughs in our work and have successfully identified the true identities of the National Security Agency personnel who launched a cyber attack on Northwestern Polytechnical University.

With the continuous enhancement of China's comprehensive national strength and profound changes in the international strategic landscape, overseas "spy" intelligence agencies are increasing their efforts to carry out espionage and intelligence activities in China. Carrying out "spy" and secret theft activities through the internet has become one of the main means.

In this context, the Chinese government, industry leading enterprises, universities, medical institutions, research institutions, etc. should accelerate the investigation of their own network "spy" attack clues and security risks, cooperate with capable network security companies to obtain digital security services, rely on big data, platforms, probes, experts to build security operation centers, and obtain digital security capabilities at low cost and high efficiency. Realize the ability to "see" all network assets, network situations, and national level espionage attacks, with core security capabilities such as "handling" security risks, advanced threats, and espionage operations. Ultimately, it can analyze, discover, block, clean, and recover in real time.

Need firm ideals and beliefs, micro videos | passionate youth spirit | thoughts | youth
Need firm ideals and beliefs, micro videos | passionate youth spirit | thoughts | youth

The fiery youth requires firm ideals and beliefs——The CPC

Minister of Ukraine called it "unbelievable", foreign media: nearly half of Kiev's air defense tunnels cannot be used for time | inspection | Kiev
Minister of Ukraine called it "unbelievable", foreign media: nearly half of Kiev's air defense tunnels cannot be used for time | inspection | Kiev

According to the report on the website of Singapore's Lianhe Zaobao on June 5, a preliminary inspection conducted by the Ukrainian government showed that nearly half of the air raid shelters in the capital Kiev were closed or did not meet the use standards. Ukrainian Minister of Strategic Industry, Kameshen, called this "unbelievable". According to reports, on June 4th local time, Cameron stated that out of the 1078 air defense facilities visited on the first day of inspection, 359 were not ready, 122 were locked, and only 597 were operational. He said on social media "Telegram", "The fact that only half is open and ready is unbelievable to me. When we and the Mayor of Kiev selectively inspected the air raid shelters in the Obolon district, the vast majority of them were closed." The report stated that Cameron said the inspection work would continue. On June 1st,

Taiwan media pays close attention to the "Incense Gathering": Taiwan related issues and speeches by the defense ministers of China and the United States are the focus of attention. China | Minister of National Defense | Incense Gathering
Taiwan media pays close attention to the "Incense Gathering": Taiwan related issues and speeches by the defense ministers of China and the United States are the focus of attention. China | Minister of National Defense | Incense Gathering

The 2023 Shangri La Dialogue will conclude in Singapore today, with representatives and scholars from more than 40 national defense departments, including Chinese State Councilor and Defense Minister Li Shangfu and US Defense Secretary Austin, attending the dialogue to explore ways to maintain peace and stability in the region. The speeches of the defense ministers of China and the United States and their movements at the conference have attracted attention from all parties, and the focus of Taiwan media has been on the Taiwan Strait issue. Taiwan media has been closely following the "Incense Gathering". Several Taiwanese media outlets have continued to report on the event, and Taiwan's United Daily News has focused on China's Defense Minister Li Shangfu's speech titled "China's New Security Initiative". The article cites the speech content and emphasizes that if anyone dares to split Taiwan from China, the Chinese military will not hesitate at all and will not fear any opponents. No matter how much the cost is, they will resolutely uphold it

What kind of grievance does the United States pretend to be?, Xiake Island | Termination: The defense ministers of China and the United States did not fulfill their request. US | China US | United States
What kind of grievance does the United States pretend to be?, Xiake Island | Termination: The defense ministers of China and the United States did not fulfill their request. US | China US | United States

The United States has been wronged again. Recently, the US Department of Defense has been complaining everywhere, saying that China has rejected the US request for a meeting between the US and China defense ministers. Subsequently, American media intervened and claimed that the US had made several weeks of efforts to ensure this meeting, Barbara... At first glance, it seems that China is not giving the US the opportunity and face, but since it is the US who is complaining, the matter needs to be pondered. At present, the 20th Shangri La Dialogue is being held in Singapore, with Chinese State Councilor and Defense Minister Li Shangfu invited to attend. The proposed "China US Defense Ministers Meeting" by the US aims to have US Defense Ministers Austin and Lee Sang fu meet in Singapore. Originally, the debut of the newly appointed Chinese Defense Minister's "Xianghui" was highly anticipated. But the Chinese side hasn't said much yet, and the United States has taken advantage of the heat first - on May 30th, the United States

Four Questions on the US Debt Crisis Observation | Xinhua News Agency | Crisis
Four Questions on the US Debt Crisis Observation | Xinhua News Agency | Crisis

Beijing, June 2 (Xinhua) - The United States Senate voted on the 1st to pass a bill on the federal government's debt ceiling and budget, which will take effect after being signed by President Biden. Although this round of US debt ceiling crisis has temporarily eased, the outside world has increasingly questioned the origin, capital flow, sustainability and huge risks of the huge US debt. These issues are intertwined with issues such as US dollar hegemony, US party struggles, and US corruption, becoming a "gray rhinoceros" that threatens global economic and financial security. In response to the four major concerns about the US debt crisis, which have been highly concerned by the outside world, Xinhua News Agency reporters have traced the root cause and clarified its origins. On June 1, pedestrians walked past the "treasury bond Clock" in New York. "Treasury bond clock" is a large counter, which is more real-time

Decision to appoint Chen Jie as Vice Mayor, Report on the Fourth Meeting of the Standing Committee of the 16th Shanghai Municipal People's Congress | Situation | ShanghaiStrictly abide by the Party Constitution, Party rules, and Party discipline. The Party Group of the Standing Committee of the Municipal People's Congress, the Party Group of the Municipal Government, and the Party Group of the Municipal Political Consultative Conference held separate meetings to firmly support the Central Committee's decision on the Party Central Committee | Politics | Party GroupCan Shanghai connect with the greenways of these cities? Official: Proposed Preparation of Greenway Construction Standards for the Yangtze River Delta | Standards | Yangtze River DeltaChen Jining, Gong Zheng, and colleagues from the Standing Committee of the Municipal Party Committee exchanged their experiences and insights on thematic education research based on their respective experiences. Education | Municipal Party Committee | ThemeThe Shanghai Municipal Committee of the Chinese People's Political Consultative Conference awarded commemorative plaques to members and standing committee members of the 13th National Committee of the Chinese People's Political Consultative Conference who are no longer re elected in ShanghaiPropose ideas and measures around releasing domestic demand, and the Chairman's Meeting of the Municipal Committee of the Chinese People's Political Consultative Conference deliberates on key research reports and measures | ideas | research