TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

An inside look at NSA tactics, techniques and procedures from China's lens

232 pointsby davikr3 months ago

15 comments

quanto3 months ago
&gt; Chinese cyber organizations openly acknowledge and publicize their partnerships. This openness was particularly interesting to observe and may be influenced by cultural factors, such as the Confucian emphasis on shared knowledge and a political framework that encourages collective efforts.<p>I or anyone outside obviously cannot verify the technical details. However, the above statement struck as particularly uninformed. As any engineer in East Asia can tell you, there is nothing especially collaborative about tech in Confucian culture; if anything, the engineers in that region admire the free speech and discussion traditionally prized in the Western culture. Calling Chinese political framework, especially in the context of national security, conducive to open public discussion was quite ironic to see.<p>Edit: the punchline is this. If a friend who is always secretive and deceptive about his personal life is suddenly openly discussing his life, what does that say about the details he just disclosed and&#x2F;or the situation he is currently in?<p>source: I regularly work with engineers from that culture and studied relevant geopolitics.
评论 #43109275 未加载
评论 #43111078 未加载
rdtsc3 months ago
&gt; No attacks occurred during Memorial Day and Independence Day holidays which were unique American holidays.<p>Simple but effective. A good non-NSA agency should also learn from this to be able to effectively false-flag as NSA, as long as they are flexible enough to allow off-hours and overtime pay and remember to respect the US federal holidays.<p>&gt; Two zero-days were used to breach any company with SunOS-exposed systems in neighbouring countries to China<p>SunOS? Wonder if it&#x27;s because it&#x27;s genuinely used still quite a bit or they simply had zero-days for it since many of those are old and unpatched?
评论 #43106408 未加载
评论 #43107493 未加载
评论 #43106359 未加载
评论 #43108572 未加载
breppp3 months ago
It seems like the most efficient way of detecting NSA tools is a regular expression of two all caps dictionary words
评论 #43106323 未加载
评论 #43106549 未加载
motohagiography3 months ago
glad to see the same basic tradecraft from 90s hacking, only very refined and industrialized. it&#x27;s a durable skill. the focus on switches and routers is very pro, as they are the most opaque infra with the fewest forensic capabilities. iot is less reliable as RE&#x27;ing cheap devices and firmware for IoCs is accessible, where almost nobody outside the IC did core gear (word to phenolit from back in the day tho).<p>the traffic redirection is interesting in that i would be curious if they rate limited it or used on device selectors in their implant to redirect traffic. the trade off between memory caching packets to sort on selectors vs.stealthy throughput would have been a fun design meeting.<p>hunting these kinds of actors would be supremely fun. the main thing that protects them is few outside massive bureaucracies really care enough or find it economical, as the rewards are more in finding new zero day and not hunting state level threat actors. the exceptions who do (p0, citizenlab etc) are attached to massive orgs and dont really led themselves to privateering. amazing write up anyway.
评论 #43110389 未加载
dmix3 months ago
&gt; In total, 54 jump servers and 5 proxy servers were used to perform the attack coming from 17 different countries including Japan, South Korea, Sweden, Poland and Ukraine with 70% of the attacks coming from China’s neighbouring countries.<p>I&#x27;m guessing this is so when they do data exfiltration (and hosted MITM) it&#x27;s not sending a ton of data to a single server, but spreads them out.<p>&gt; SECONDDATE: This tool was allegedly used by TAO (NSA) to hack into the office intranet of the University. Attribution of SECONDDATE was discovered through collaboration with other industry partners. They found thousands of network devices running this spyware – where the communications went back to NSA servers located in Germany, Japan, South Korea and Taiwan. This tool was used to redirect user traffic to the FOXACID platform.<p>&gt; SECONDDATE – Backdoor installed on network edge devices such as gateways and border routers to filter, and hijack mass amounts of data in a MiTM. This was placed on the border routers of the University to hijack traffic to redirect to NSA’s FOXACID platform.
ThinkBeat3 months ago
Given how US is attacking their enemies and at times their allies, 24&#x2F;7 it is amazing how little we ever hear about it.
评论 #43108527 未加载
评论 #43108348 未加载
评论 #43108941 未加载
评论 #43108535 未加载
mmooss3 months ago
&gt; 1. Attack Times<p>&gt; * One of the frameworks used by TAO that was forensically uncovered during the incident named “NOPEN” requires human operation. As such, a lot of the attack required hands-on-keyboard and data analysis of the incident timeline showed 98% of all the attacks occurred during 9am – 4pm EST (US working hours).<p>&gt; * There were zero cyber-attacks on Saturdays and Sundays with all attacks centralised between Mon-Fri.<p>&gt; * No attacks occurred during Memorial Day and Independence Day holidays which were unique American holidays.<p>&gt; * No attacks occurred during Christmas.<p>It&#x27;s surprising the NSA would be this sloppy and obvious, or maybe they don&#x27;t care about attribution in this situation, or maybe someone else did it. But I&#x27;ve read attribution of Chinese attackers using work hours and thought the attackers were sloppy and obvious.<p>&gt; A key observation from the Chinese case notes was the extensive use of big data analysis, particularly in tracking “hands-on keyboard” activity. This approach enabled Qihoo 360 to identify patterns, such as the alleged absence of activity on Memorial Day, and precisely documenting the operational hours of the attackers, allowing 360 to isolate activity to Monday-Friday, EST working hours.<p>If the blogger&#x27;s claim of experience is true, they must know about the things I&#x27;ve read. I wonder what they are thinking of.
alphalite3 months ago
I originally came here to comment how crazy it seems that DoD employees at NSA cannot be bothered to cover their tracks by working nonstandard hours&#x2F;holidays (obviously Mil &amp; Intel folks do this, they even get deployed!). But the thought occurred to me that attribution to NSA was likely a desired outcome here (“We can hack you too”) and there are probably many people at NSA working nonstandard hours&#x2F;days to prevent attribution.<p>I think the English language aspect is much more interesting and difficult&#x2F;impossible to prevent.
评论 #43109425 未加载
评论 #43108020 未加载
评论 #43107592 未加载
markus_zhang3 months ago
This is really interesting. I wonder how red-teams in State sponsored teams operate in real life. I guess every one has an NDA, but would love to get a general idea.<p>I assume it&#x27;s a jungle out there, so teams need to protect themselves 24&#x2F;7&#x2F;365 and I&#x27;m surprised to find no activities in holidays.
iudqnolq3 months ago
&gt; Second date has capabilities of network eavesdropping, MiTM, and code injection<p>This is probably a dumb question but doesn&#x27;t that require an SSL cert? Obviously the NSA can get someone to issue a cert for a domain they don&#x27;t own but wouldn&#x27;t that be visible?<p>Couldn&#x27;t you have every user device log the SSL certs it sees to detect this attack? What about CT?
mmooss3 months ago
&gt; The Northwestern Polytechnical University had allegedly suffered multiple breaches throughout the years where several pieces of malware uncovered in prior investigations (prior to Shadow Broker’s leak) were allegedly the same tools described in the Shadow Broker’s leak.<p>What is Shadow Broker, does anyone know?
评论 #43114493 未加载
评论 #43111477 未加载
themark3 months ago
It seems like the lack of operations during US holidays would be a big oversight.
klooney3 months ago
&gt; 98% of all the attacks occurred during 9am – 4pm EST (US working hours). &gt; There were zero cyber-attacks on Saturdays and Sundays with all attacks centralised between Mon-Fri. &gt; No attacks occurred during Memorial Day and Independence Day holidays which were unique American holidays. &gt; No attacks occurred during Christmas.<p>Come on guys, if Satoshi can cover his timezones tracks, so can you.
kridsdale13 months ago
I love the Windows 98 clip art.
thaumasiotes3 months ago
&gt; These insights stem from extensive research I did on Weixin<p>Someone doing extensive research on Weixin might ordinarily realize that it&#x27;s called &quot;Wechat&quot; in English.
评论 #43107519 未加载