Workflow
网络窃密
icon
Search documents
小王大学毕业找工作,发现工作内容仅是记录某军港船只进出港时间,立即举报,国家安全部:提供重要线索,奖励
Xin Lang Cai Jing· 2025-12-28 01:56
心怀鬼胎的"网友" 小李为某涉军单位工作人员,偶然在交友软件上结识了网友小A,因其头像照片青春靓丽、言谈热情大 方,小李对她产生了好感。随着接触深入,小A主动表示自己身边的朋友一直想找军人男友,希望能将 小李介绍给自己的朋友。小李回想起先前聊天中,小A也曾多次试图打听自己单位内部情况,意识到自 己可能遭遇境外间谍情报机关人员,小李果断中止了与小A的联系,并将情况反映给国家安全机关。经 国家安全机关调查,小A等账号实为境外间谍情报机关设置的网络陷阱,意图策反我境内人员,窃取重 点单位敏感信息。 在数字空间的深处,与你彻夜畅谈的"宝藏网友",或许正在编织一张温柔的陷阱。当"生财之道""高薪 兼职""网络情缘"突然降临,你能否识破背后的窃密黑手? 别有用心的"私信" 赵某退伍后,经常在社交平台发布自己着军装的照片,获得网友大量点赞评论。某天一境外IP用户私信 赵某,称想要"咨询"一些部队内部情况,并许以高额"报酬"。赵某认为自己已经退伍,只要不透露太敏 感的信息,应该"问题不大",于是多次向该境外人员透露军队内部信息,以换取金钱利益。一次酒后, 赵某向朋友小张炫耀其"生财之道",小张感到事态严重,劝说赵某回头是岸, ...
看似“宝藏网友”实则“窃密黑手” 国安部发布最新提醒
Yang Shi Xin Wen· 2025-12-27 23:49
在数字空间的深处,与你彻夜畅谈的"宝藏网友",或许正在编织一张温柔的陷阱。当"生财之道""高薪兼职""网络情缘"突然降临,你能否识破背后的窃密黑 手? 别有用心的"私信" 赵某退伍后,经常在社交平台发布自己着军装的照片,获得网友大量点赞评论。某天一境外IP用户私信赵某,称想要"咨询"一些部队内部情况,并许以高 额"报酬"。赵某认为自己已经退伍,只要不透露太敏感的信息,应该"问题不大",于是多次向该境外人员透露军队内部信息,以换取金钱利益。一次酒后, 赵某向朋友小张炫耀其"生财之道",小张感到事态严重,劝说赵某回头是岸,赵某却不以为然。为防止赵某越陷越深,小张通过国家安全部官方微信公众号 举报受理渠道向国家安全机关反映了可疑情况,并帮助赵某悬崖勒马。最终,小张因维护国家安全获得国家安全机关奖励。 另有所图的"招聘" 小王大学毕业后结合自身专业与兴趣,在网上投递简历,期望找到一份满意的工作。一位自称是某海洋环境污染检测公司的人力主管主动联系小王,表示小 王的专业背景和实习经历都非常符合公司要求。进一步接触后,小王发现这一"岗位"的主要工作内容是前往本地某军港附近拍摄过往船只,记录船只出海、 返港时间并将信息上传公 ...
微软被曝通过UCPD.sys隐藏数据监控中国用户
Xin Lang Cai Jing· 2025-09-19 04:23
Core Viewpoint - Microsoft is accused of using UCPD.sys to secretly monitor Chinese users by hiding encrypted data and releasing unknown programs to collect user data, with automatic activation of monitoring features in China [1] Group 1: Data Monitoring Allegations - Technical experts claim that Microsoft utilizes UCPD.sys to conceal encrypted data and deploy unknown programs for user data collection [1] - The code is reported to automatically activate monitoring and upload "telemetry data" specifically for users in China [1] Group 2: Software Interception - The system reportedly includes mechanisms to intercept Chinese software, which is suggested to maintain Microsoft's market monopoly [1] Group 3: Previous Reports - Earlier in April, state media reported that the U.S. National Security Agency exploited backdoors in Windows for cyber espionage against China [1] - Microsoft has not provided an official response to these allegations [1]
美方利用微软Exchange漏洞攻击我军工企业!详情披露
Zhong Guo Xin Wen Wang· 2025-08-01 02:45
Core Insights - The article highlights the increasing frequency and sophistication of cyberattacks by U.S. intelligence agencies targeting China's high-tech military and defense sectors, posing significant threats to national security [1][4] Group 1: Cyberattack Incidents - A notable incident involved the exploitation of a zero-day vulnerability in Microsoft Exchange, where U.S. intelligence agencies controlled a major military enterprise's email server for nearly a year, compromising over 50 critical devices and establishing covert channels for data theft [1][2] - Attackers utilized multiple foreign IP addresses to launch over 40 attacks, successfully stealing emails from 11 individuals, including high-ranking officials, related to military product designs and core system parameters [2] - Another incident targeted a military communications and satellite internet enterprise, where attackers exploited unauthorized access and SQL injection vulnerabilities to implant backdoor programs and malware, compromising over 300 devices and searching for sensitive data related to military networks [3] Group 2: Threat Landscape - In 2024 alone, there were over 600 cyberattack incidents against important Chinese entities, with the defense and military sectors being the primary targets, particularly from state-sponsored APT organizations [4] - U.S. intelligence-backed hacker groups are characterized by their organized attack teams, extensive engineering support systems, and advanced vulnerability analysis capabilities, posing a severe threat to China's critical information infrastructure and key personnel [4]