Hackers create backdoor to generate cyber attacks

The cybersecurity firm Check Point found a vulnerability found by Chinese criminals to take advantage of US networks

The cybersecurity company Check Point discovered a backdoor created by Chinese hackers to generate cyberattacks in US networks taking advantage of the security vulnerabilities of its system, in order to infiltrate it.

These criminals created tools that would allow them to create a path or bridge to “capture and reverse engineer the internal exploitation tools of the United States”, within the framework of the trade war between China and the United States, as indicated in a statement from Check Point.

The cybersecurity company notes that, apparently, Americans invest millions of dollars in the development of exploits internally, which are fragments of software or data that allow exploiting a security vulnerability for a cyber attack. The Chinese hackers decided to create a backdoor to take advantage of it, that is, a sequence within the programming code with which the security systems of the authentication algorithm can be avoided to access the system.

From Check Point they affirm that “one of the most decisive aspects of this strategy in the one of consolidating in the networks of the potential American victims, extending quickly once they are inside.”

The technical director of Check Point for Spain and Portugal, Eusebio Nieva, points out that “this discovery allows us to take a look at the modus operandi of Chinese hackers when it comes to exploitation tools, which are extremely scarce and valuable resources they are usually built with internal equipment or purchased from third parties, but here we can see a different pattern, since the tools obtained by the Chinese are collected and subjected to reverse engineering in the United States.”

K. Tovar

Source: dpa

You might also like