US ‘Lone Wolf’ Cyber Attacks: From Cyber Hegemony to Isolation

Published in Guangming Daily
(China) on 27 March 2024
by Han Xu, Ding Jie (link to originallink to original)
Translated from by Jo Sharp. Edited by Mitchelle Lumumba.
In recent years, the United States has become notorious for relying on its technological advantages and hegemonic position to carry out “lone wolf” cyber attacks on other countries, including its allies. However, as the differences between the interests of the U.S. and its allies in cyberspace become increasingly apparent and tensions with non-allied countries increasingly escalate, its cyber deterrence strategy has reached the end of the road.

Cyber Hegemony in the Name of an 'Open Internet'

In April 2022, the U.S. launched what is known as the "Declaration for the Future of the Internet." As we all know, the original intention of this declaration was not really to fight for the openness of the internet, but to fight for the United States in the name of “Internet openness,” and what it seeks is not in the interest of the internet but in the interest of the U.S. At the same time, the U.S. has been carrying out indiscriminate cyber attacks and stealing secrets on a global scale. It constantly fabricates various stories of “security reports” and hypes the issue of Chinese cyber espionage. It seems that the U.S. has put the idea of the pot calling the kettle black to good use.

In June 2022, the APT-C-40 (Equation) group supported by the U.S. National Security Agency launched an attack on Northwestern Polytechnical University and stole core technical data including vital network configurations as well as network management, operation and maintenance data. Forty-one kinds of special offensive network tools and equipment were used, with 14 different versions of the backdoor tool, “DoubleFantasy,” alone. In July 2023, the hacker group associated with the NSA used "Second Date" spyware to carry out a cyber attack on the Wuhan Earthquake Monitoring Center. A report released by Pangu Lab showed that the NSA-linked Equation Group had used top-tier backdoors to carry out “Operation Telescreen” for more than a decade in 45 countries and regions around the world, including the United Kingdom, Germany and the Netherlands. This far exceeded what was publicly reported by the United States.

Taking Advantage of Technological Resources To Blatantly Steal Data around the World

The U.S. has long used its technological advantage to carry out activities like hijacking network traffic, man-in-the-middle attacks and the insertion of malicious code by exploiting backdoor vulnerabilities and also monopolies on operating systems. They’ve carried out precision content filtering and automated hijacking of massive amounts of global data to achieve various goals such as the man-in-the-middle attacks, network traffic sniffing and network session tracking. Western media disclosed that the NSA remotely intercepted 97 billion emails and 124 billion phone records around the world in a 30-day period.

This included 500 million interceptions from Germany, 70 million from France and 60 million from Spain. It monitored the leaders of 35 countries, keeping former German Chancellor Angela Merkel under surveillance for 11 years. In June 2023, foreign security vendors disclosed that the NSA had used multiple zero-day vulnerabilities to target mobile devices around the world that run on Apple’s iOS operating system. It used zero-click vulnerabilities to infect via the iMessage platform and gain complete control over devices and user data through multiple exploits.

Joint progress and collaboration are inevitable trends of the age; thus, cyber dominance represents a serious departure, a threat to the common well-being of people around the world. The U.S. cyber-deterrence strategy goes against modern social development. Countries around the world should seek greater and deeper cooperation, strive for the greatest common denominator of mutually beneficial, win-win cooperation in cyberspace and promote reform and improvement of the international rules and governance mechanisms of cyberspace by building a community with a shared future in cyberspace, to better meet the common interests of nations.


近年来,美国依托其技术优势及霸权姿态,长期针对包括盟友在内的其他国家实施“孤狼式”网络攻击,可谓劣迹斑斑。然而,随着美国与其盟友在网络空间利益分歧日益凸显,与非盟友国家的对立逐步加剧,其网络威慑战略已如“强弩之末”。
  以“互联网开放”之名行网络霸权之实
  2022年4月,美国发起所谓的“互联网未来宣言”。众所周知,这宣言的初衷并不是真正为互联网的开放而战,而是借助“互联网开放”的名义为美国而战,谋求的不是互联网利益,而是美国利益。与此同时,美国却在全球范围内实施无差别网络攻击和窃密行为,不断炮制各种版本的“安全报告”,炒作所谓“中国网络窃密”问题,可谓是将“颠倒黑白、贼喊捉贼”的伎俩发挥得淋漓尽致。2022年6月,由美国国家安全局(NSA)扶植的APT-C-40(方程式)组织对西北工业大学开展攻击窃密,窃取关键网络设备配置、网管数据、运维数据等核心技术数据,先后使用了41种专用网络攻击武器装备,仅后门工具“狡诈异端犯”就有14款不同版本。2023年7月,与NSA关联的黑客组织使用“二次约会”网络间谍软件针对武汉市地震监测中心进行网络攻击。盘古实验室发布的报告显示,隶属NSA的黑客组织“方程式”利用顶级后门对英、德、荷等全球45个国家地区开展长达十几年的“电幕行动”,远超美国公开报道的数据。
  利用技术资源优势,明目张胆窃取全球数据
  长期以来,美国利用技术优势,通过后门漏洞植入、操作系统垄断等手段,实施网络流量劫持、中间人攻击和插入恶意代码等行为,对全球海量数据进行精准过滤与自动化劫持,以实现中间人攻击、网络流量嗅探、网络会话追踪等功能。西方媒体透露,NSA曾在30天内远程窃取全球970亿封邮件和1240亿条电话数据,其中德国5亿份、法国7000万份、西班牙6000万份,在其监听的35国领导人中,对德国前总理默克尔的监听长达11年。2023年6月,国外安全厂商披露了NSA组织使用多个iOS平台Oday漏洞针对全球iOS移动设备的攻击活动,通过iMessage平台使用0-click漏洞进行感染,先后利用多个漏洞获得对设备和用户数据的完全控制。
  共进协同乃时代发展之必然,网络霸权主义严重背离全球人民共同福祉。美国“网络威慑”战略已与现代社会发展潮流相悖。世界各国应寻求和深化合作,谋求互利共赢的网络空间“最大公约数”,通过构建网络空间命运共同体,推动网络空间国际规则与治理机制的改革与完善,从而更好地满足世界各国的共同利益。
This post appeared on the front page as a direct link to the original article with the above link .

Hot this week

Japan: Expectations for New Pope To Mend Rifts among American People

OPD: 16 May 2025, edited by Helaine Schweitzer

Austria: Soon Putin Will Have Successfully Alienated Trump

Germany: Trump-Putin Call: Nothing but Empty Talk

Canada: Scorning Trump’s Golden Dome Would Be a Mistake

Topics

Austria: Soon Putin Will Have Successfully Alienated Trump

Canada: Scorning Trump’s Golden Dome Would Be a Mistake

Australia: Which Conflicts of Interest? Trump Doubles Down on Crypto

Russia: Will Trump Investigate Harris? Political Analyst Responds*

Germany: Ukraine War: Cease-fire Still Out of Reach

Japan: Expectations for New Pope To Mend Rifts among American People

OPD: 16 May 2025, edited by Helaine Schweitzer

Related Articles

Hong Kong: The Lessons of World War II: The Real World Importance of Resisting Hegemony

Mexico: The Trump Problem

Taiwan: Making America Great Again and Taiwan’s Crucial Choice

Venezuela: Vietnam: An Outlet for China

Germany: US Companies in Tariff Crisis: Planning Impossible, Price Increases Necessary