Workflow
揭秘央视报道美网络攻击背后的细节:三角测量漏洞极其隐蔽

Core Viewpoint - The article highlights a covert cyber attack by the NSA on China's National Time Service Center, exploiting vulnerabilities in foreign brand mobile phone messaging services to steal sensitive information and disrupt critical national infrastructure [1][6]. Group 1: Attack Details - The NSA began exploiting the messaging service vulnerability in March 2022, remotely hijacking the phones of over 10 staff members at the National Time Service Center, leading to the theft of contacts, messages, location data, and login credentials for office systems [1][3]. - From April 2023, the attackers accessed the center's computer network multiple times, deploying 42 customized cyber attack tools, including "eHome_0cx" for stealth, "Back_eleven" for communication tunneling, and "New_Dsz_Implant" for data theft [3][4]. Group 2: Implications of the Attack - The attack poses a significant threat beyond ordinary data breaches, as the National Time Service Center provides the "Beijing Time," which is crucial for financial transactions, 5G communication, and aerospace missions. Disruptions could lead to widespread power outages or mission failures [4][6]. - The NSA's actions aim to compromise sensitive information related to high-precision timing systems, which could directly impact key sectors such as finance, communication, and aerospace in China [6][10]. Group 3: Vulnerability and Security Concerns - The vulnerabilities exploited are categorized as "zero-day" vulnerabilities, with the cost of such exploits in underground markets ranging from $500,000 to $1 million. The NSA reportedly utilized four zero-day vulnerabilities for this operation [8]. - The incident raises questions about the security of Apple devices, as the NSA's actions have tarnished the perceived safety of Apple products, leading to public skepticism regarding their security features [9][10].