The National Computer Virus Emergency Response Center and 360 Company jointly released an investigation report today (4th), revealing the relevant situation of the CIA's use of cyber attacks on other countries, disclosing the specific process of some typical cybersecurity cases in China and other countries, and comprehensively and deeply analyzing the CIA's cyber attack theft and related real harm activities, as well as its contribution to the United States becoming a "matrix". The release of the report will provide reference and recommendations for victims of cyberattacks around the world.

The United States Central Intelligence Agency (CIA), one of the main intelligence agencies of the US federal government, has long been secretly implementing "peaceful evolution" and "color revolutions" around the world, and continues to carry out espionage activities.

In 2020, 360 independently discovered a never-before-exposed cyberattack group that used CIA-linked cyberweapons tools to carry out cyberattacks against targets in China and other countries, dating back to 2011 and continuing to this day. The targets include important information infrastructure, aerospace, scientific research institutions, petroleum and petrochemicals, large Internet companies and government agencies in various countries.

The investigation team, jointly established by the National Computer Virus Emergency Response Center and 360 Company, found that in the large-scale global cyber attack operation, the CIA used a large number of "zero-day" vulnerabilities, including a large number of backdoors and vulnerabilities that have not been publicly disclosed so far (some of which have been verified), established "botnet" networks and attack springboard networks around the world, and staged attack intrusion operations against network servers, network terminals, switches and routers, and a large number of industrial control equipment.

In the course of investigating a number of typical cyberattacks in China, the Joint Investigation Team captured and successfully extracted a large number of Trojans, functional plug-ins and attack platform samples closely linked to the CIA from the information network of the victim unit. These related cyber weapons have been strictly standardized, process-oriented and professionally managed by software engineering, and only the CIA has developed cyber attack weapons in strict compliance with these standards and norms.

Through empirical analysis, the joint investigation team found that the CIA's cyber weapons use extremely strict espionage technical specifications, various attack methods echo back and forth, interlocked, now covering almost all Internet and Internet of Things assets in the world, can control other countries' networks anytime, anywhere, steal other countries' important and sensitive data, and this undoubtedly requires a lot of financial, technical and human resources support, the United States-style cyber hegemony can be seen, the "Matrix" is well deserved.

At present, the joint investigation team has provided the relevant information to the public security organs in the jurisdiction of the victimized units in China. This station will continue to pay attention to the follow-up progress of this matter.

(CCTV News Client CCTV Reporter Li Wenjie Zhang Gang)