Beijing says it uncovered US National Security Agency operatives behind cyberattack on Chinese university
- ‘Second Date’ software used in Northwestern Polytechnical University attack is potent cyber espionage tool developed by US agency, says state media
- After global tracing, Chinese team reportedly found ‘thousands of network devices’ across the country still infected by the spyware and its derivatives
State broadcaster CCTV said on Thursday that China’s National Computer Virus Emergency Response Centre, with help from Chinese antivirus company 360 Total Security, had discovered the identity of the National Security Agency (NSA) operative or operatives – the broadcaster did not specify how many or name them – after it extracted “multiple samples” of a spyware called “Second Date”.
It said the spyware was used in the cyberattack on Northwestern Polytechnical University in Shaanxi province.
The report said technical analysis showed that Second Date was a cyberespionage weapon developed by the NSA to sniff out and hijack network traffic and insert malicious codes.
Quoting senior engineer at the National Computer Virus Emergency Response Centre Du Zhenhua, it said software was a potent cyberespionage tool that enabled attackers to take control of target network devices and the data traffic flowing through them, and use them as a “forward base” for the next stage of attacks. It could run on various operating systems and was compatible with multiple architectures.