The United States cannot escape the blame this time. Many important information systems in China have been found to contain traces of backdoor programs, and the United States is likely to be the initiator. With the popularization of Internet technology, many fields, including tra

2024/04/2907:50:33 technology 1482

The United States is not to blame this time. Many important information systems in China have been found to have traces of being implanted with the backdoor program , and the United States is likely to be the initiator.

The United States cannot escape the blame this time. Many important information systems in China have been found to contain traces of backdoor programs, and the United States is likely to be the initiator. With the popularization of Internet technology, many fields, including tra - DayDayNews

With the popularization of Internet technology, including transportation, finance, hospitals, scientific research, industrial production and many other fields, they have long been inseparable from the support of the Internet. The value of network information security is self-evident.

Recently, 360 company released a research report, revealing traces of the activity of a Trojan horse program called "validator", which quickly caused an uproar. The report

shows that many domestic scientific research institutions have discovered traces of this kind of Trojan horse program activity. This means that the important data of these institutions may have become the target of Trojan horse programs.

Don't underestimate this small Trojan program. It can not only be deployed remotely, but also manually installed on multiple versions of Windows systems.

The United States cannot escape the blame this time. Many important information systems in China have been found to contain traces of backdoor programs, and the United States is likely to be the initiator. With the popularization of Internet technology, many fields, including tra - DayDayNews

What is even more worrying is that once this kind of Trojan horse program exists on the computer, it can achieve 7*24 hours of uninterrupted monitoring. Computer data and files can be downloaded at any time, and self-destruct programs can be activated if necessary. The technical results of

's painstaking research will have no secrets in front of these Trojan programs, which is scary to think about. What is even more worrying about

is that the "validator" Trojan does not fight alone, but has a complete intrusion platform behind it.

Many domestic scientific research institutions have discovered the "validator" Trojan, and the "Sour Fox" platform behind it actually belongs to the US Security Agency. After research, the company

360 found that the U.S. Security Agency may have used the "Sour Fox" platform to conduct unfriendly "accesses" to the networks of many important institutions and organizations.

"Sour Fox" uses Trojan programs such as "validator" to lurk in the target user's terminal for a long time, and through these backdoor programs, it can initiate deeper penetration at any time.

The United States cannot escape the blame this time. Many important information systems in China have been found to contain traces of backdoor programs, and the United States is likely to be the initiator. With the popularization of Internet technology, many fields, including tra - DayDayNews

To put it simply, it is equivalent to asking someone to build a house. After you live in it for decades, you find that all the exterior walls of this house are actually transparent. The

acid fox platform adopts a distributed architecture and has multiple dedicated servers, which has strong information penetration capabilities. Some research by

believes that the Sour Fox platform can perform key filtering for servers in certain specific regions, and has the ability to match and implant conditional judgments on mainstream anti-virus software.

is such a "tailor-made" Trojan program. If you say it is an unintentional move, I am afraid no one will believe it.

As one of the birthplaces of global Internet technology, the United States has advantages in both software and hardware, but it blatantly uses the Internet as a tool to steal information, which is really shocking.

The United States cannot escape the blame this time. Many important information systems in China have been found to contain traces of backdoor programs, and the United States is likely to be the initiator. With the popularization of Internet technology, many fields, including tra - DayDayNews

Despite the irrefutable evidence, the United States still has no intention of stopping and is actually increasing its espionage budget. What should we do?

It’s terrifying to think about it. An advance bill in the United States shows that the budget for cyber espionage activities will increase to 11.2 billion, an increase of 8% from the past.

According to the scanning and detection information of a domestic Internet company, there are hundreds of important information systems in the country that have traces of network intrusion.

This has to make us rethink, is the Internet still safe? How should we respond to severe challenges?

Trojan horse program represented by "validator", with the help of the Sour Fox platform, is likely to have spread all over the world. Fortunately, it was discovered in time, which gave us a clearer direction for closing similar loopholes.

Especially in the fields of finance, scientific research, education, electricity, energy, transportation and other fields, there is a high dependence on the Internet. Once an accident occurs, the consequences will be disastrous.

can't solve the problem of Internet security by shouting slogans and simple communication. If you don't have strong technical strength, you can only let some people make trouble.

The United States cannot escape the blame this time. Many important information systems in China have been found to contain traces of backdoor programs, and the United States is likely to be the initiator. With the popularization of Internet technology, many fields, including tra - DayDayNews

Nowadays, Internet security has attracted more and more attention. We must also cultivate more network security talents and increase network attack and defense research to cope with unexpected needs.

In addition to prevention, do you think there is any better way?

technology Category Latest News