The Hack That Made China a Superpower: Operation Shady Rat

Поделиться
HTML-код
  • Опубликовано: 11 июн 2024
  • Operation Shady Rat - the hacking operation that changed the world forever. It all began in 2006, when an employee of a construction company in South Korea received an email with an attachment.
    🎯 Subscribe to @cybernews for more AI news and cybersecurity updates: cnews.link/subscribe/
    🎪 Looking for entertainment and interesting stories? Check out our playlists filled with captivating content that will keep you entertained for hours:
    • Infamous Hacks
    • Cyber Tops
    • Cyber Crime
    📰 Stay up-to-date with the latest cybersecurity news and trends by checking out our curated news playlist. We cover the latest threats, trends, and insights from the world of cybersecurity:
    • Latest NEWS
    💬 Stay connected with us on social media for the latest news, insights, and discussions around cybersecurity: linktr.ee/Cybernews
    💌 Stay up-to-date on the latest cybersecurity trends and news by subscribing to our Cybernews: • Latest NEWS
    📷 Thinking of purchasing a camera? Check out what is the best camera for you - cnews.link/best-cameras/y27B-...
    00:00 Intro
    01:54 How Operation Shady Rat Started
    05:06 Unit 61398
    07:56 Why Shady Rat Happened?
    10:19 The New Rats
    🥷 Secure your online activities - Check out a VPN with the best discount - cnews.link/get-nordvpn/y27B-s...
    🔑 Keep your accounts safe - Get THE BEST password manager offer - cnews.link/get-nordpass/y27B-...
    🦠 Protect your devices - Grab an EXCLUSIVE Antivirus deal - cnews.link/get-bitdefender/y2...
    Image Credits: drive.google.com/file/d/1OzQ6...
    ℹ️ About us
    We are an independent news outlet with a RUclips channel that posts cybersecurity & tech news videos daily. Our foremost concern is the safety and security of our viewers around the world. We remain vigilant on the issue of hacking and will provide updates as they become available. A number of our investigations and reports have been featured by industry-related publications and global news leaders like Forbes, PC mag, and Techradar.
  • НаукаНаука

Комментарии • 1,5 тыс.

  • @cybernews
    @cybernews  7 месяцев назад +361

    Let us know if you would like to see more explainers like this!

    • @michaelmayhem350
      @michaelmayhem350 7 месяцев назад +2

      Why isn't Joe hosting this?

    • @cerealpeer
      @cerealpeer 7 месяцев назад +4

      now this is an explainer that i wanted to see

    • @ytg6663
      @ytg6663 7 месяцев назад +1

      Yep. I love to watch explainers like these lengthy video > 20 min as movie 🍿😊😊

    • @ytg6663
      @ytg6663 7 месяцев назад +1

      always

    • @amiyoghosh
      @amiyoghosh 7 месяцев назад +1

      I love it!

  • @mikelbrenn111
    @mikelbrenn111 7 месяцев назад +570

    Lockheed Martin billion dollar technology and yet bought an ebay network security.

    • @DoomCycle
      @DoomCycle 4 месяца назад +55

      Greed breeds stupidity

    • @isenewotheophilus6485
      @isenewotheophilus6485 4 месяца назад +43

      the biggest vulnerability in a system is humans

    • @heijimikata7181
      @heijimikata7181 2 месяца назад

      @@isenewotheophilus6485 And money. Once money is involved, a lot of things become clearer for people who want to investigate these strange “anomalies” in national security.

    • @RPcropland
      @RPcropland 2 месяца назад

      @@isenewotheophilus6485stupid humans not humans in general

    • @goolgal1638
      @goolgal1638 Месяц назад

      If the us doesn't force a security standard, companies wont enforce it.

  • @terrywong7879
    @terrywong7879 7 месяцев назад +1350

    You mean to tell me that NSA, PRISM and all the other hackers didn't catch that. The US budget is over 50 billion for US hackers. Other countries are better?

    • @clearheaded5696
      @clearheaded5696 7 месяцев назад +512

      Well, this empire is very good in a few thing, namely writing story, telling it convincingly and make believe for their tax payer to support more money spent on new projects in the name of National Security, right.

    • @PriyanshuThakur-iv5ll
      @PriyanshuThakur-iv5ll 7 месяцев назад +147

      ​@@clearheaded5696huhh an American who knows truth

    • @waNErBOY
      @waNErBOY 7 месяцев назад +137

      you cant buy talent, the US has been trying to do so for long.

    • @foxtraner
      @foxtraner 7 месяцев назад +19

      dont take it seriously, reasoning with these people makes no sense, people only believe what they want to believe and content creator only wants money out of it.

    • @rv8804
      @rv8804 7 месяцев назад +59

      Did u not watch the video? They specifically said that they knew about it when the Snowden leaks came out.

  • @matthewexline6589
    @matthewexline6589 4 месяца назад +33

    Roman proverb: "Opportunity makes the thief.". As long as America continues to blame other countries for it's own shortcomings progress won't come. Face facts: You're responsible for your own vulnerabilities.

  • @banalresentive6523
    @banalresentive6523 5 месяцев назад +691

    Regarding F35 design theft: When I worked for Defence companies, it was standard for all classified data and software to be stored on locked-down air-gapped systems. Avoiding those DOD mandates could get you free room and board at a federal facility for several years (IF you didn't have the right contacts, see case of Sandy Burger). Have the security rules been relaxed? Have we gotten that stupid? If this was willful stupidity on the part of Lockheed Martin staff, they should VERY PUBLICLY be convicted and sent to the Big House. I font

    • @banalresentive6523
      @banalresentive6523 5 месяцев назад +23

      Continued - edit session was aborted somehow. I don't care if the top responsible person was the CEO of LM.

    • @beayn
      @beayn 5 месяцев назад +52

      I believe it's usually mistakes. Temporary systems set up for testing purposes and forgetting to remove them.
      Files copied from air gaped server for research but forget to remove them from the connected server etc.
      That said I don't know what happened in this case.

    • @andrewsandoval2685
      @andrewsandoval2685 5 месяцев назад

      Simple, you don't go after Lockheed you go after their part vendors. China realized that if you go after the small businesses that have a DoD connection you can effectively unveil all the parts and pieces that go into it. Don't try to steal the schematics for the radar system find the business that manufactures them for both Military and Civilian. Can't crack those guys? go for the ones that lost the contract to the other guys they're probably worse but it beats expending the billions in research that goes into it.
      Software is the biggest kicker and most likely the most secure, that's developed in house however with AI you can now supercharge it.
      China can copy American design and manufacturing but they're just cheating. They won't actually learn anything or why we developed or how which ironically makes them rely on the U.S.
      China is quite literally leeching off the money of the American tax payer

    • @andrewsandoval2685
      @andrewsandoval2685 5 месяцев назад +76

      This all happened pre-Snowden before 2007 back when sub-contractors kept kicking the bucket in regards to security. When the F35 incident happened the DoD lost it's collective shit and cracked down.

    • @stussymishka
      @stussymishka 5 месяцев назад +4

      yes makes me sick

  • @wavydavy9816
    @wavydavy9816 6 месяцев назад +648

    Every single one of these companies could have avoided all this trouble by spending more money on security rather than just 'hoping' that the measures they had in place would be good enough.

    • @jordanedmond5618
      @jordanedmond5618 6 месяцев назад +1

      Or simply cut off China from the internet, and block all access from China to the US

    • @EB-73-
      @EB-73- 5 месяцев назад +57

      Very ignorant comment. The age old adage rings true, if you build it, they will come.
      This isn't ancient China with Mongols on horseback. The threat, as was just explained to you, is persistent, and ever evolving.
      Cold war never ended mate.

    • @wavydavy9816
      @wavydavy9816 5 месяцев назад +27

      @@EB-73- Excuses excuses.
      Being proactive costs money so there's a cut off point where companies know that they need security but it's cheaper to just cross your fingers, hope for the best, and pay off individuals who _do_ get screwed over.
      Or, if you like, you can just pretend that doesn't happen.
      Very ignorant comment 😂

    • @EB-73-
      @EB-73- 5 месяцев назад +48

      @@wavydavy9816 Point being is that security itself is an illusion. As you so kindly point out, no amount of money is ever enough. At some point you HAVE to cross your fingers and call it good.
      If you want the gods honest truth, the best security would have been not to go digital in the first place. Or maintain a closed loop system. Both of which cost next to nothing by comparison.
      Once you open yourself up to attack it's impossible to ever say with certainty that it won't come.
      Perhaps that concept is a bit difficult for you to reconcile.

    • @wavydavy9816
      @wavydavy9816 5 месяцев назад

      @@EB-73- I own a nice motorbike which I have to park on the street.
      I have done everything possible to make sure that nobody can steal my motorbike and get away with it.
      It has taken a lot of money and effort to get to that stage, some might even say that I've gone too far with my security (which, admittedly, makes it slightly inconvenient to use my motorbike).
      A team of people who specifically set out to steal _my_ motorbike and circumvent the various devices fitted would indeed be able to steal it, given an unrealistic amount of time, then they'd have to store it underground to stop the tracker working to avoid recovery
      I can confidently say that I'm not worried about my bike being stolen, because I've taken those measures myself, and that's being pro-active. I can measure the amount of hassle potential bike thieves face compared to how much profit they are likely to make, seee the cut off point and act accordingly.
      Banks and other financial institiutions definitely don't care about their customer's investments as much as I care about my motorbike, and THAT'S the difference.
      If they _really_ wanted to they could do it no problem 🤷‍♂

  • @SSS-sz8mg
    @SSS-sz8mg 7 месяцев назад +60

    Moral of the story, never ever use Windows OS for the work!

    • @edgeldine3499
      @edgeldine3499 24 дня назад +3

      It would have still happened... Why? Because people still clicked on the emails.

    • @ashenabeysinghe4767
      @ashenabeysinghe4767 20 дней назад +5

      Linux is not 100% immune. But it is way better than Windows. I've seen even some ATM machines running on Windows XP.

    • @Vivi-xn9iz
      @Vivi-xn9iz 3 дня назад

      @@ashenabeysinghe4767 most ATM machines run on windows XP. In fact, a grand majority of similar systems run on windows XP

  • @criptovida
    @criptovida 7 месяцев назад +550

    China became smarter when they started using local technology companies. The US still has higher access to other countries as they can inject any RAT along with Windows OS which the majority of countries do use in their critical infrastructures.

    • @douglascampbell4993
      @douglascampbell4993 7 месяцев назад

      yeah the west doesnt work like that operationally. state and business isnt connected the way it is in say China, russia, North Korea etc. They dont have access to OS development at all, They have tried to have backdoor access for law inforcement but its just not a good business plan and customer confidence is king, so only an idiot would grant the government that kind of access! Just ask any Hong Kong citizen.. lmao..

    • @criptovida
      @criptovida 7 месяцев назад

      @@douglascampbell4993 Maybe not, but it's arguable. China does use some western cloud solutions like Azure but only hosted in Chinese data centers managed my Chinese companies.

    • @aaraviii
      @aaraviii 7 месяцев назад +84

      Heard of Linux? "Critical" infrastructures nowadays don't use good old Windows anymore

    • @criptovida
      @criptovida 7 месяцев назад

      You might be talking abou the west, I have worked in many emergent countries and most services do run on Windows even airports. FYI there are ATM machines running Windows XP still, many countries have stopped in the stone age.@@aaraviii

    • @djamaldossantos1624
      @djamaldossantos1624 7 месяцев назад +92

      ​@@aaraviiiThat would be good if people acted smart. And if there's something you cannot underestimate is human capacity to make stupid decision in key infrastructure

  • @hdogdizzy720
    @hdogdizzy720 7 месяцев назад +284

    Please post more content like this weekly.

    • @hdogdizzy720
      @hdogdizzy720 7 месяцев назад +4

      Wonderful video

    • @Andreas_linden
      @Andreas_linden 7 месяцев назад +8

      Work 24/7 😂😂

    • @neanda
      @neanda 5 месяцев назад +3

      100% agree, thiis one of the best videos i've seen in a long time

    • @SpunckyJew6969
      @SpunckyJew6969 5 месяцев назад

      ​@@Andreas_linden serve the hive mind, right? Not a chance, I say. Ridiculous

  • @smallpeople172
    @smallpeople172 7 месяцев назад +113

    That Lockheed Martin employees face when he found out what happened must have been… *chefs kiss*

    • @neanda
      @neanda 5 месяцев назад +21

      i was thinking that too, he just gave the chinese the plans for their most advanced fighter jet. i'm sure he left that accomplishment out of his CV

    • @smallpeople172
      @smallpeople172 5 месяцев назад +16

      @@neanda reminds me of the NASA intern who dropped a wrench six stories down onto the Shuttle heat shield, causing millions in damages and weeks in repairs. Guy was fired before he got off the elevator.

    • @beayn
      @beayn 5 месяцев назад +8

      I'm guessing the person who clicked the mail wasn't the only one at fault. Someone left the plans in a place that was easily accessible as well. It's nearly always a series of mistakes.

    • @twavee
      @twavee 5 месяцев назад +2

      @@smallpeople172 Those two don't compare well. One could be interpreted as a civil mistake for civil penalties, and the other can be interpreted as being traitorous.

    • @smallpeople172
      @smallpeople172 5 месяцев назад +1

      @@twavee interpretation depends on intent

  • @nazmdar
    @nazmdar 5 месяцев назад +157

    This is exactly what US has done to Iran by developing Stuxnet worm. It was one of the most sophisticated attacks to the control system of an industrial plant.

    • @shinigamirenegade
      @shinigamirenegade 3 месяца назад +2

      Boy sheer havoc. Darknet diaries episode was crazy.

    • @axenik
      @axenik 2 месяца назад

      Iranian nuclear development is hardly a positive and beneficial organization as U.S. industries.

    • @kentlu4781
      @kentlu4781 2 месяца назад +16

      NSA: focus on hacking others, too busy to take care of the domestic cybersecurity🐶😎

    • @adreiiaii510
      @adreiiaii510 Месяц назад

      @@kentlu4781 In fairness to NSA employees, this isn't really their fault.
      The NSA is structured as a surveillance and code-breaking agency. That's *all* they do.
      The NSA works with US Cyber Command to engage in Offensive Security practices (as well as conduct Cyber Warfare Operations, but... shh, they aren't supposed to do that).
      CISA (CyberSecurity & Infrastructure Security Agency) is the agency responsible for US Federal Cyber Security and infrastructure.

    • @OEFarredondo
      @OEFarredondo 19 дней назад

      This seems far worse. One factory in Iran vs thousands of stolen industrial secrets...

  • @wseam1
    @wseam1 4 месяца назад +14

    TL;DR they aren’t that smart, we’re just that stupid.

  • @railfan_3371
    @railfan_3371 6 месяцев назад +105

    Who had the "brilliant" idea of hooking up the controls of the most important infrastructure in the world to the internet?

    • @notanymore9471
      @notanymore9471 6 месяцев назад +20

      Well it’s mostly engineering portals for remote access and monitoring of systems. But security is often light or non existent in these areas.

    • @realmemegalactic
      @realmemegalactic 6 месяцев назад +5

      Bill gates

    • @sepg5084
      @sepg5084 5 месяцев назад +8

      ​@@realmemegalacticand the Bush republican government.

    • @kanalisationerstellen
      @kanalisationerstellen 5 месяцев назад +7

      the IT departments that get paid by American companies i feel like to put everything into the cloud :)

    • @Heeroyui752
      @Heeroyui752 5 месяцев назад +8

      Remote monitoring is needed to catch problems before they start impacting public health.

  • @rschloch
    @rschloch 6 месяцев назад +43

    That screensaver sound laughable, but I worked for a company who had a corporate screensaver.

    • @Dwigt_Rortugal
      @Dwigt_Rortugal 5 месяцев назад +7

      It's baffling how many "advanced" and highly educated users fall for the most basic social engineering. People can be absolutely brilliant and yet completely naive and ignorant.

    • @rschloch
      @rschloch 5 месяцев назад

      @@Dwigt_Rortugal yeah. I think a lot of people are in „get it done mode“ and mindlessly click m-on and react-to every email.

    • @a8f235
      @a8f235 4 месяца назад

      @@Dwigt_Rortugal CuteCatVideo.exe just install...Uhm, I mean just open a watch 🤨😅 Yup, there's no shortage of naiv people so hackers or scammers don't need much of a brain at all. They just hammer out the same bs by the millions, and they know they will have positive hits even how foolish it is.

    • @jyy9624
      @jyy9624 3 месяца назад

      It's like a website cypher

  • @Kekoa1207
    @Kekoa1207 5 месяцев назад +12

    Got my sub on the first vid. The visuals, even the simple ones, were really insightful

  • @smokinjoe6911
    @smokinjoe6911 5 месяцев назад +25

    We do not have to put our infrastructure on the net to begin with. Seems to be a security risk easily explored. Why risk National Security for convenience?!?

    • @michaelpelzek8882
      @michaelpelzek8882 5 месяцев назад +6

      Exactly! I saw somebody say, well it stifles innovation. Maybe, but I would rather it take an extra year or two then have our enemies also be able to use the same weapons technology we do. You cant have it both ways.

  • @davecullins1606
    @davecullins1606 5 месяцев назад +130

    At this point it must ironically be safer to just store the most important and most classified information solely in a seriously sealed chamber, that almost nobody knows about, underground with meters thick concrete walls. No copy on any computer at all.
    It's probably how some of those things are already being handled.

    • @misosalmonfromthecheesecak3387
      @misosalmonfromthecheesecak3387 5 месяцев назад +16

      B21 bomber schematics and nuclear secrets I reckon

    • @TheBorg01
      @TheBorg01 5 месяцев назад +5

      even the electric cable one day will be used to hack machines so it would have to be off the grid too lol

    • @dzungtran314
      @dzungtran314 5 месяцев назад +22

      But doing so makes it impossible for our own scientists to learn and improve upon those designs. Science progress depends on collaboration. So there is no easy way

    • @rdablock
      @rdablock 5 месяцев назад

      I mean the leak benefits everyone. The Chinese get their blueprints and the DoD and MIC gets to bang their drums to the tunes of trillions

    • @twenty-fifth420
      @twenty-fifth420 5 месяцев назад

      ⁠@@dzungtran314I mean, it depends. Scientists didn’t seem to have a problem innovating a literal bombshell in the Manhattan Project. That isn’t the issue though, I think you missed it.
      The issue is if you have any classified information, one that is a cognito hazard to the public at large, then you by definition trying to hide information. Scientists or not. Even politicians or not. You have to be either high up with the DOD, the FBI/CIA or the Armed Forces if it were a serious piece of information.
      The most secure location if you can’t encrypt your own data and protect it is ironically what OP said. A locked cabinet no one knows about. Data sanitation and security is still hard for the average person, it is why security researchers and scientists often raise the alarm when breaches in any network, private or public is made especially with Malware and Phishing.

  • @factsoverfeelings1776
    @factsoverfeelings1776 6 месяцев назад +13

    Western nations using it for manufacturing made it a super power.

  • @flyinghippo519
    @flyinghippo519 7 месяцев назад +23

    “There is no honour among thieves”.

    • @bluesclues132
      @bluesclues132 22 дня назад

      @mugbeer9440 already there - next stage is making it profitable and building brands .

  • @Collinmcspirit
    @Collinmcspirit 5 месяцев назад +9

    3:30 - RuneScape Dragon Scimitar haha.. brings back memories

    • @JoeRogansForehead
      @JoeRogansForehead 3 месяца назад +1

      Haha screw doing Monkey Madness to wield that thing

  • @nameismetatoo4591
    @nameismetatoo4591 4 месяца назад +40

    I'd be willing to be that most of these companies/organizations that were victims of Shady Rat had at least one employee raise concerns about their poor infosec to a superior, and were promptly ignored. The people in charge often don't understand anything about this kind of stuff, and don't like it when someone below them knows more than they do. Thankfully that's been slowly changing over the last decade, but it's always going to be a problem to some extent.

    • @eskileriksson4457
      @eskileriksson4457 4 месяца назад +1

      It's the Dunning-Kruger effect. Which will never go away, unless we let AI run the show.

    • @truthboom
      @truthboom 5 дней назад

      @@eskileriksson4457 they will just use quantum computer boosted AI to override the other AI

  • @Swess2908
    @Swess2908 5 месяцев назад +33

    China has a point there. If someone else does it why cant they.

    • @rallinrallen8040
      @rallinrallen8040 8 дней назад

      As long as you are a nuclear threat then you can do what ever you want

  • @universemath
    @universemath 7 месяцев назад +76

    love the storytelling and the narration

    • @cybernews
      @cybernews  7 месяцев назад +1

      Thank you for the kind words!

    • @2HN.
      @2HN. 6 месяцев назад +3

      @@cybernews 7:00 "Their attacks were brazen and aggressive. Relying more on poor cybersecurity of victims..."
      So, it was just a marketing stunt for antivirus software companies?

  • @harmonicspice2536
    @harmonicspice2536 5 месяцев назад +17

    I didn't get the fallacy part? Why is the argument wrong? " If the US conducts them, why shouldn't we " 10:53

    • @s.v.discussion8665
      @s.v.discussion8665 3 месяца назад +6

      It is not.

    • @andrewzhao444
      @andrewzhao444 3 месяца назад +4

      It is a fallacy on an individual moral level. Assuming that an action is immoral, other people being immoral does not change that fact. This is true for criminals, for example. Other criminals existing does not absolve any person of their crimes.
      It is a fair argument on a social level. The argument distilled is that one party is being unequally held accountable for an action that everyone does. Typically these actions are wrong on an individual level, but necessary evils on country level. All countries kill people. If you only ever target one country for killing people, that is not a fair criticism, but just a social attack.

  • @MrNedinator
    @MrNedinator 5 месяцев назад +15

    love the dragon scimmy as the cursor lmao. reminds me of the old hack videos on YT back in 2010ish era :P

  • @Drenicite
    @Drenicite 4 месяца назад +3

    Treat research sounds like a sweet gig

  • @yesmhm69
    @yesmhm69 4 месяца назад +6

    All infrastructure should have analog redundancy if not be entirely non-network

  • @user-ed7hd1xh6x
    @user-ed7hd1xh6x 4 месяца назад +1

    A great little documentary! A++

  • @blehbleh9283
    @blehbleh9283 5 месяцев назад +102

    10:51 hilarious that this is presented as a logical fallacy in the context of geopolitics. If you're a global power, you should be hacking, and hacking well

    • @vaakdemandante8772
      @vaakdemandante8772 5 месяцев назад

      @@albertkirilov6921 what is there more to say? Nations that matter on the world stage are doing hacking regardless of any laws, either domestic or international. Just because some official document states they aren't means nothing. I mean, maybe it does to the gullible public but not to the people who are in the know.

    • @nodaxxing
      @nodaxxing 5 месяцев назад +13

      Logical fallacies were originally designed by Aristotle cuz he was essentially a Destiny debate-lord. He’d go to public squares to debate people and put both their social reputation on the line, and you can imagine who won the most. their purpose is not to prove anything or make any sort of meaningful point, it is to discredit the opposing sides point without actually attacking it, just the logical structure of it; which is different than saying something is illogical. Way too many people equate logical fallacies with illogical. Illogical means that there are missing steps, claims of logical fallacies attack the steps you are taking instead of the destination. Claiming that something is a logical fallacy might win over the majority of people, but in any sort of competition you want to be doing as much if not more than your opponent. Good fear mongering though keep it up 🎉

    • @salj.5459
      @salj.5459 5 месяцев назад +10

      @@nodaxxingSocrates was the original annoying debate lord. He was so hated he got killed for it

    • @nicholaspearse2222
      @nicholaspearse2222 4 месяца назад +4

      @@nodaxxingall that typing for a fallacy fallacy 😂😂😂

    • @HughEtl
      @HughEtl 4 месяца назад

      @@nodaxxingdo you not agree with his statement tho

  • @Cybersawz
    @Cybersawz 7 месяцев назад +15

    Awesome narration and video content! Subscribed!

  • @sabercruiser.7053
    @sabercruiser.7053 7 месяцев назад +1

    Thank you much greatful 👍👍🙌🙌👏👏

  • @redcat4321
    @redcat4321 3 месяца назад +3

    Why don’t they just disconnect from internet?? Can’t get hacked if there is no connection to outside.

  • @ParitoshTripathiOfficial
    @ParitoshTripathiOfficial 7 месяцев назад +9

    back again, always like these type of vids.

  • @davejoseph5615
    @davejoseph5615 5 месяцев назад +5

    Why would anyone be dumb enough to ask the e-mail sender if the file attachment is legit?

    • @qdaniele97
      @qdaniele97 5 месяцев назад +1

      There is (or was) plenty of troians that used to spread themselves by running through yous email contacts and sending copies of itself to them.
      But they obviously weren't able to properly reply to a question like a human would.
      Those poor guys thougth the person on the other side was one of their collegues and asked if they were the ones that sent the mail and not some software, when they found that they were talking to an actual human everything suddenly seemed fine to them.

  • @mykey49
    @mykey49 Месяц назад +2

    At the same time there was a purge of all CIA human assets in the Chinese mainland, Hong Kong and Macau. The US has never recovered since again.

  • @noneofyourbusiness8625
    @noneofyourbusiness8625 2 месяца назад

    Omg that dscim 07 scape cursor brought me back to my childhood 😢😢😢😢 custom moparscape clients makes me wanna cry a bit

  • @zapoyou2
    @zapoyou2 5 месяцев назад +13

    3:30 with the RuneScape dragon scimitar 😂😂😂

  • @lmlm1234ful
    @lmlm1234ful 6 месяцев назад +9

    This is the Art of War!

  • @claudiamanta1943
    @claudiamanta1943 2 месяца назад

    10:23 Phew 😮‍💨 that’s reassuring.

  • @odis_of_america
    @odis_of_america Месяц назад +1

    I enjoy watching your videos great job.

  • @Ricky-pz4di
    @Ricky-pz4di 7 месяцев назад +53

    Please more of this! If possible even a bit technical (imo)

  • @cassiopesysg5423
    @cassiopesysg5423 5 месяцев назад +17

    As a Shanghaiese I'm quite surprised to see they're actually doing such big things in that building.

  • @MicheleDamato-co7vh
    @MicheleDamato-co7vh 2 месяца назад +2

    Considering America is the leader in hacking, I don't understand the storyline... whoever rules technology rules the world.....

  • @ThatGuyThatDiedToday
    @ThatGuyThatDiedToday 5 месяцев назад +28

    This video is great! If at all possible, please include source material for this/future informational videos. Sounds like it'd be a great read. After doing some searching it's proving rather difficult to find the source material

    • @w462dh
      @w462dh 23 дня назад

      it is, because it is baseless, just storytelling, have fun watching!

  • @CanadianFitted
    @CanadianFitted 6 месяцев назад +151

    Great video brother 🔥 Been trying to tell people about this for years , the Chinese are also hyper focused on a quantum computer, pouring more resources and money into the project than anyone else. You could probably speculate the implications of that more than I could but it’s not great 😁

    • @user-dc1ud6px3s
      @user-dc1ud6px3s 6 месяцев назад +11

      It would be analogous to the cracking of the Enigma and JN25 codes.

    • @kylorenkardashian79
      @kylorenkardashian79 6 месяцев назад +14

      they already have it, it's called Jiuzhang1 & Jiuzhang2.
      their quantum computer is different than ours, they use lasers & mirrors, it's a double slit delayed choice setup on steroids

    • @neanda
      @neanda 5 месяцев назад +2

      @@kylorenkardashian79 omg i'll have to find out more about this. i like that analogy

    • @shashankdixit8949
      @shashankdixit8949 5 месяцев назад +2

      ​@kylorenkardashian79 nobody has a quantum computer lol it would take another 20 years to have one

    • @Jem_Apple
      @Jem_Apple 5 месяцев назад

      ⁠@@shashankdixit8949literally every major player has quantum computers. U can even get access online 😂

  • @ok373737
    @ok373737 5 месяцев назад +2

    Great video!

  • @laddcraner4170
    @laddcraner4170 5 месяцев назад +1

    Great content. More please....

  • @davidjrb
    @davidjrb 7 месяцев назад +17

    That was awesome. Really enjoyed it

  • @BetaProductionz
    @BetaProductionz 7 месяцев назад +32

    “This is CEO open file” is the Chinese equivalent of “show bobs” lol

    • @GTFO_0
      @GTFO_0 7 месяцев назад +4

      😭😭lmao i can't 😂😂😂bro comon
      Don't have to Do our indian broa like that

    • @PluetoeInc.
      @PluetoeInc. 6 месяцев назад

      ​@@GTFO_0 💀 OP is dumb af and he knows it look at his pfn , but the broken English part is legit tho

    • @guydreamr
      @guydreamr 5 месяцев назад

      *shows boobs*

  • @TobiKellner
    @TobiKellner 23 дня назад +2

    How exactly is "The US is doing it, so why shouldn't we?" a logical fallacy?

  • @curious_one1156
    @curious_one1156 Месяц назад +2

    The US is after Linux distros now. Since people have stopped using for critical infra, as the US introduces vulnerabilities in windows.

    • @ElijahHuang-di7fn
      @ElijahHuang-di7fn Месяц назад

      Bill Gate is a SELLOUT Commie CCP Agent 🇨🇳

  • @GarethDavidson
    @GarethDavidson 5 месяцев назад +10

    This could be solved by just making external hack attacks that do crypto mining but no damage or info theft are civil matters, not criminal, and any company that is hacked must report the intrusion or face huge fines. A free for all that forces everyone to tighten security overnight

  • @flyingllama87
    @flyingllama87 7 месяцев назад +7

    Awesome Content. More like this.

  • @govanisalaiz1019
    @govanisalaiz1019 5 месяцев назад

    This will be on textbooks! I hope you get credited.

  • @DeadSezSo
    @DeadSezSo 2 месяца назад

    Man, you sure know how to tell a story. That intro was perfect: tells its own short story, grabs your attention, piques your curiosity then abruptly ends just as it reveals an answer that only raises more questions and increases the mystique...first video of yours I've watched but I was just blown away immediately. Not my typical content but you've got a new subscriber here!

  • @neanda
    @neanda 5 месяцев назад +30

    i hope this video and your channel gets to millions as it's info people and companies definately need to know.
    what an amazing video, best i've seen in a long time in terms of the insights and high production quality. this was quite an adveture. please do more like this, i'm gonna spend some time binging on your channel as I just discovered it today (and i'm in the tech iindustry as it's defo my kind of thing)

  • @felixkiprop48
    @felixkiprop48 7 месяцев назад +17

    How do you make such clip? the edit is perfect. Great video.

    • @cybernews
      @cybernews  7 месяцев назад +3

      Thank you so much for the feedback!

  • @SO-fb4ef
    @SO-fb4ef 25 дней назад

    Dragon scimitar, a man of culture I see...

  • @ryelor123
    @ryelor123 18 дней назад

    Literally the best argument for staying away from the metric system. Let them have to deal with all the unit conversion.

  • @RoboticDragon
    @RoboticDragon 5 месяцев назад +4

    Fantastic video, very informative, thanks for sharing.

  • @ladeedaa
    @ladeedaa 7 месяцев назад +13

    That's how we became a super power also!
    USA 🇺🇸 USA 🇺🇸

  • @user-gk9pw8ky6m
    @user-gk9pw8ky6m Месяц назад +1

    Very interesting video ❤ love from China

  • @phlanxsmurf
    @phlanxsmurf 5 месяцев назад

    That last comment was scary. Really engaging video. Thanks, you just got a new sub. 😊

  • @HreForTheMusic
    @HreForTheMusic 5 месяцев назад +4

    If you enjoyed this you ahould read 'this is how they tell me the world ends'. It covers this an a whole lot more about the cyber arms race

  • @mchammer3927
    @mchammer3927 7 месяцев назад +652

    I'm sure we never spy on any body ....

    • @Ahoooooooo
      @Ahoooooooo 7 месяцев назад +169

      😂 i am thinking the same ....
      The US is only sour because someone else did it better .
      Or they are playing the moral card , because no one has caught them yet 😅 .

    • @user-tf5nm8yq1h
      @user-tf5nm8yq1h 7 месяцев назад +2

      😂

    • @orbitaldebri66
      @orbitaldebri66 7 месяцев назад

      Oh it's a given, we absolutely haven't spied on anyone.....😈👿🫅👿😈

    • @douglascampbell4993
      @douglascampbell4993 7 месяцев назад +30

      @@Ahoooooooo lol.. Yeah we definitely should have just left the Japanese to keep doing their thing back in world war two.. 🤣😅

    • @GTFO_0
      @GTFO_0 7 месяцев назад

      I mean china just caught spies of cia just a couple of days back 😂

  • @wongtan5089
    @wongtan5089 7 месяцев назад

    Its very easy nowadays to get info on new tech, half of them are startups and people were advertizing their stuff everywhere

  • @christianrandall5618
    @christianrandall5618 6 месяцев назад

    My first video on this channel, amazing !

  • @Tryste
    @Tryste 7 месяцев назад +7

    Interesting honeypot story

  • @ytg6663
    @ytg6663 7 месяцев назад +7

    Awesome Explainer video. 👍👍👍

  • @tommyX.808
    @tommyX.808 4 месяца назад

    great intro. now i'm excited

  • @GustavoSilva-ny8jc
    @GustavoSilva-ny8jc 10 дней назад

    4:38 Okay, this is more pathetic negligence than genius of the attacker

  • @fahrrurrozi686
    @fahrrurrozi686 7 месяцев назад +9

    USA: I never spy to anyone 😂

  • @Lazerecho
    @Lazerecho 7 месяцев назад +9

    Cant spell China without CIA

    • @smoothbraindetainer
      @smoothbraindetainer 5 месяцев назад +2

      Ok and you can't spell "homeowner" without "meow" what's your point

  • @Dubiouscyclist
    @Dubiouscyclist 2 месяца назад

    Subscribed!

  • @mikediaz9033
    @mikediaz9033 28 дней назад

    Definitely.
    Extremely Brilliant.

  • @Nohandleyetf
    @Nohandleyetf 4 месяца назад +10

    me: why are you avoiding my messages?
    her: I am taking counter measurements against Chinese spies.

  • @konstantinrebrov675
    @konstantinrebrov675 5 месяцев назад +10

    Such is the meaning of cold and ruthless pragmatism.

  • @rhenium1877
    @rhenium1877 24 дня назад +1

    is this what Mr.Robot was trying to show ?

  • @SR-pv4ix
    @SR-pv4ix 5 месяцев назад +1

    This is a fantastic video. Well done.

  • @DotADBX
    @DotADBX 4 месяца назад +4

    Its why critical infrastructure and military assets should always be on a air gapped network, additionally having a fake network that lets you track your would be attackers and in turn hack them back is an ideal strategy

    • @wecx2375
      @wecx2375 3 месяца назад

      Nobody really cares.

  • @Mark_nobody3
    @Mark_nobody3 5 месяцев назад +5

    To sum it up
    “Thanks for giving me the keys to your house and now your system is mine”

  • @ecpgieicg
    @ecpgieicg 4 месяца назад

    4:49 Anyone knows the soundtrack around this part of the documentary?

  • @Sv_edoni
    @Sv_edoni 3 месяца назад

    6:53 What music is this? The background music sounds stylish to the topic

  • @merounkidi8037
    @merounkidi8037 7 месяцев назад +5

    the rats are in Palo Alto, CA as homeless people living in all saints church opposite chase bank near the city hall .

  • @oscr8129
    @oscr8129 7 месяцев назад +7

    DOES ANYONE REALISE HOW CHINA MAPLOOKS SO MUCH LIKE AMERICAN MAP

  • @CA-cg8kh
    @CA-cg8kh 3 месяца назад

    How you stop it once it was found out who attack/hack the system

  • @fpxy00
    @fpxy00 5 месяцев назад +7

    Nobody does this better than US gov. through its big tech companies.

  • @GauravKumar-fj7tp
    @GauravKumar-fj7tp 5 месяцев назад +24

    😂 I always thought that there was some high level shit going on with Lockheed but now I laugh looking at this

  • @user-fi4eh3im1b
    @user-fi4eh3im1b 5 месяцев назад

    2 things I got from this video I saw the dragon scimmy 😭🤷‍♂️ & 2 sounds like gremlins og theme song at 7:36

  • @yzzxxvv
    @yzzxxvv Месяц назад

    Shocking
    The hidden attacks were much more than caught one

  • @elevationsickness8462
    @elevationsickness8462 6 месяцев назад +18

    The f35 being stolen is such a massive L considering the whole point is how computerized and it is. Why didnt we listen to Battlestar Galactica😭

    • @erickgonzalez4698
      @erickgonzalez4698 5 месяцев назад

      Battlestar? What do you mean?

    • @jan.tichavsky
      @jan.tichavsky 5 месяцев назад +6

      I don't think so. You can steal the hardware blueprints but getting the software and getting it working on copied hardware is much harder, not to mention you won't get any updates. Which why is Tesla vetting on fast innovation. By the time someone else copies their hardware and software it's already obsolete. And they certainly won't copy the massive servers for training and collecting data using another custom architecture.

    • @Gongolongo
      @Gongolongo 5 месяцев назад +2

      ​@@jan.tichavsky they did get the software at the time too

  • @user-yc3zv6gp3w
    @user-yc3zv6gp3w 5 месяцев назад +5

    There are always holes in the infrastructure created by people. It is a difficult problem. The only way is reduce the attack surface, isolate data within a secure network and make convenience non existent. Only allow downstream traffic. Encryption at rest and transit between internal services. These are the things i can think about.

  • @sdkoflpdlfs1104
    @sdkoflpdlfs1104 5 месяцев назад +1

    On 0:43 why are there Laos and Vietnam? Are they known for cyberattacks?

  • @PaulSpades
    @PaulSpades 5 месяцев назад +1

    Amazing.

  • @chewy1709
    @chewy1709 5 месяцев назад +3

    China graduates more engineers every year than there are engineers in the US. Chew on that bro

  • @richardhoo8226
    @richardhoo8226 7 месяцев назад +13

    Everything start with CIA. .

  • @JoeShmo4
    @JoeShmo4 5 месяцев назад

    Great content

  • @47db59
    @47db59 6 месяцев назад +1

    That's how even they have housing crisis.

  • @merounkidi8037
    @merounkidi8037 7 месяцев назад +4

    all of Chinese military and officials have their original physical bodies in Titing a village in the sub division of Moutourwa in Cameroon

  • @hurrikkkanes2533
    @hurrikkkanes2533 7 месяцев назад +6

    takes one to know one 😂