Chinese spyware code was copied from America's NSA - researchers | The Business Standard
Skip to main content
  • Epaper
  • Economy
    • Aviation
    • Banking
    • Bazaar
    • Budget
    • Industry
    • NBR
    • RMG
    • Corporates
  • Stocks
  • Analysis
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • Subscribe
    • Epaper
    • GOVT. Ad
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
The Business Standard

Saturday
May 17, 2025

Sign In
Subscribe
  • Epaper
  • Economy
    • Aviation
    • Banking
    • Bazaar
    • Budget
    • Industry
    • NBR
    • RMG
    • Corporates
  • Stocks
  • Analysis
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • Subscribe
    • Epaper
    • GOVT. Ad
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
SATURDAY, MAY 17, 2025
Chinese spyware code was copied from America's NSA - researchers

World+Biz

Reuters
22 February, 2021, 05:05 pm
Last modified: 22 February, 2021, 05:09 pm

Related News

  • Tariff cuts ease mass China layoffs threat, but job market pain persists
  • US, China hail 'constructive' Geneva trade talks, details due today
  • Bangladesh stands at 'crucial crossroads' of transformations: Ambassador Yao
  • What role for China in Ukraine?
  • China’s Xi meets Myanmar junta chief, pledges to help rebuild post-earthquake

Chinese spyware code was copied from America's NSA - researchers

Countries around the world develop malware that breaks into their rivals' devices by taking advantage of flaws in the software that runs them

Reuters
22 February, 2021, 05:05 pm
Last modified: 22 February, 2021, 05:09 pm
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS/Kacper Pempel/Illustration
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS/Kacper Pempel/Illustration

Chinese spies used code first developed by the US National Security Agency to support their hacking operations, Israeli researchers said on Monday, another indication of how malicious software developed by governments can boomerang against their creators.

Tel Aviv-based Check Point Software Technologies issued a report noting that some features in a piece of China-linked malware it dubs "Jian" were so similar they could only have been stolen from some of the National Security Agency break-in tools leaked to the internet in 2017.

Yaniv Balmas, Checkpoint's head of research, called Jian "kind of a copycat, a Chinese replica."

The Business Standard Google News Keep updated, follow The Business Standard's Google news channel

The find comes as some experts argue that American spies should devote more energy to fixing the flaws they find in software instead of developing and deploying malicious software to exploit it.

The NSA declined comment. The Chinese Embassy in Washington did not respond to requests for comment.

A person familiar with the matter said Lockheed Martin Corp – which is credited as having identified the vulnerability exploited by Jian in 2017 – discovered it on the network of an unidentified third party.

In a statement, Lockheed said it "routinely evaluates third-party software and technologies to identify vulnerabilities."

Countries around the world develop malware that breaks into their rivals' devices by taking advantage of flaws in the software that runs them. Every time spies discover a new flaw they must decide whether to quietly exploit it or fix the issue to thwart rivals and rogues.

That dilemma came to public attention between 2016 and 2017, when a mysterious group calling itself the "Shadow Brokers" published some of the NSA's most dangerous code to the internet, allowing cybercriminals and rival nations to add American-made digital break-in tools to their own arsenals.

How the Jian malware analyzed by Checkpoint was used is not clear. In an advisory published in 2017, Microsoft Corp suggested it was linked to a Chinese entity it dubs "Zirconium," which last year was accused of targeting US election-related organizations and individuals, including people associated with President Joe Biden's campaign.

Checkpoint says Jian appears to have been crafted in 2014, at least two years before the Shadow Brokers made their public debut. That, in conjunction with research published in 2019 by Broadcom Inc-owned cybersecurity firm Symantec about a similar incident, suggests the NSA has repeatedly lost control of its own malware over the years.

Checkpoint's research is thorough and "looks legit," said Costin Raiu, a researcher with Moscow-based antivirus firm Kaspersky Lab, which has helped dissect some of the NSA's malware.

Balmas said a possible takeaway from his company's report was for spymasters weighing whether to keep software flaws secret to think twice about using a vulnerability for their own ends.

"Maybe it's more important to patch this thing and save the world," Balmas said. "It might be used against you."

Tech / Top News

NASA / China / Spyware

Comments

While most comments will be posted if they are on-topic and not abusive, moderation decisions are subjective. Published comments are readers’ own views and The Business Standard does not endorse any of the readers’ comments.

Top Stories

  • File photo of Dr Debapriya Bhattacharya. Picture: CPD
    We should treat US tariff war as opportunity, nothing to be afraid of: Debapirya
  • Finance Adviser Salehuddin Ahmed attending the new card launching ceremony by Mercantile Bank and Mastercard on 17 May 2025. Photo: Courtesy
    Bangladesh must come out of LDC status, even if it's challenging: Finance adviser
  • LGD yet to hear law ministry response on BNP leader Ishraque declared Dhaka South mayor
    LGD yet to hear law ministry response on BNP leader Ishraque declared Dhaka South mayor

MOST VIEWED

  • The workers began their programme at 8am on 23 April 2025 near the Chowrhas intersection, Kushtia. Photos: TBS
    BAT factory closure prolongs 'as authorities refuse to accept' protesting workers' demands
  • Representational image. Photo: Freepik
    Country’s first private equity fund winding up amid poor investor response
  • BGB members on high alert along the Bangladesh-India border in Brahmanbaria on 16 May 2025. Photo: TBS
    BGB, locals foil BSF attempt to push-in 750 Indian nationals thru Brahmanbaria border
  • Banks struggle in their core business as net interest income falls
    Banks struggle in their core business as net interest income falls
  • A teacher offers water to a Jagannath University student breaking their hunger strike at Kakrail Mosque intersection, as protesters announce the end of their movement today (16 May) after their demands were met. Photo: TBS
    JnU protesters end strike as govt agrees to accept demands
  • Efforts to recover Dhaka’s encroached, terminally degraded canals are not new. Photo: TBS
    Dhaka's 220km canals to be revived within this year: Dhaka North

Related News

  • Tariff cuts ease mass China layoffs threat, but job market pain persists
  • US, China hail 'constructive' Geneva trade talks, details due today
  • Bangladesh stands at 'crucial crossroads' of transformations: Ambassador Yao
  • What role for China in Ukraine?
  • China’s Xi meets Myanmar junta chief, pledges to help rebuild post-earthquake

Features

Illustration: TBS

Cassettes, cards, and a contactless future: NFC’s expanding role in Bangladesh

23h | Panorama
Photo: Collected

The never-ending hype around China Mart and Thailand Haul

23h | Mode
Hatitjheel’s water has turned black and emits a foul odour, causing significant public distress. Photo: Syed Zakir Hossain

Blackened waters and foul stench: Why can't Rajuk control Hatirjheel pollution?

1d | Panorama
An old-fashioned telescope, also from an old ship, is displayed at a store at Chattogram’s Madam Bibir Hat area. PHOTO: TBS

NO SCRAP LEFT BEHIND: How Bhatiari’s ship graveyard still furnishes homes across Bangladesh

2d | Panorama

More Videos from TBS

What are the results of the Russia-Ukraine talks in Istanbul?

What are the results of the Russia-Ukraine talks in Istanbul?

54m | TBS World
Why is Modi silent on Trump's remarks about the India-Pakistan ceasefire?

Why is Modi silent on Trump's remarks about the India-Pakistan ceasefire?

2h | TBS World
Stocks will see sharp reversal

Stocks will see sharp reversal

3h | TBS Markets
Al-Ayala, the priceless cultural heritage of humanity

Al-Ayala, the priceless cultural heritage of humanity

4h | TBS World
EMAIL US
contact@tbsnews.net
FOLLOW US
WHATSAPP
+880 1847416158
The Business Standard
  • About Us
  • Contact us
  • Sitemap
  • Advertisement
  • Privacy Policy
  • Comment Policy
Copyright © 2025
The Business Standard All rights reserved
Technical Partner: RSI Lab

Contact Us

The Business Standard

Main Office -4/A, Eskaton Garden, Dhaka- 1000

Phone: +8801847 416158 - 59

Send Opinion articles to - oped.tbs@gmail.com

For advertisement- sales@tbsnews.net