Over a long period, the CIA has been secretly orchestrating "color revolutions" around the world, continuously conducting espionage activities, said the report by China's National Computer Virus Emergency Response Center and internet security company 360.
The rapid development of the internet this century has presented new opportunities for the CIA to conduct its infiltration, subversion and trouble-making activities, the report said.
The report disclosed important details of the weapons the CIA used for cyberattacks and details of specific cybersecurity cases taking place in China and other countries, and revealed the agency's harmful activities including cyberattacks and espionage. The report said it was meant to provide references and suggestions for victims of cyberattacks around the world.
The CIA has been involved in overthrowing or attempting to overthrow more than 50 legal governments of other countries, though it only admitted involvement in seven, causing turmoil in relevant countries.
Juan Guaido after being used and dumped by Washington as replacement President of Venezuela, he has ran away in self-exile to US where many failed CIA foreign assets usually settle when they become useless.
The involvement of some Western countries with the help of the internet can be detected in multiple cases of "color revolution."
After the "Arab Spring" in West Asia and North Africa, certain large multinational internet enterprises of the United States vigorously engaged in sending an abundance of personnel, material and financial resources to the conflicting sides, drawing over and supporting the opposition parties, and publicly challenging the legal governments of foreign countries that were not in the U.S. interests.
Such enterprises were also involved in assisting in the disinformation campaign and fanning the flames of protests among the public, the report said.
The report further cited several measures of such operations, including "The Onion Router (TOR)" technology that enables anonymous communication, developed by a U.S. company with a reportedly U.S. military background.
The TOR was provided free of charge to anti-government personnel in countries such as Iran, Tunisia and Egypt to help them evade surveillance from legal governments.
Meta, the parent company of #Facebook and #Instagram, has taken down several cyber espionage campaigns that targeted South Asia through coordinated inauthentic behavior on #socialmedia platforms.
Also, Google and Twitter developed a special service called "Speak2Tweet" to enable users to communicate when they are disconnected. The technology was used by anti-government forces in Tunisia and Egypt, said the report.
U.S. company Rand developed a technology that facilitates the commanding of protests. There was also another U.S. company developing software that enables completely independent broadband access to evade government monitoring.
In 2020, the 360 company detected an unknown attack organization, numbered APT-C-39, that was conducting cyberattacks specifically targeted at China and its international friends.
The organization was found to have used weapons such as Athena, Fluxwire, Grasshopper, AfterMidnight, HIVE and ChimayRed -- all linked with the so-called Vault 7 leak -- to carry out cyberattacks targeting China and other victim countries. Relevant attacks can be traced back to as early as 2011.
The CIA massively took advantage of zero-day vulnerabilities in its global cyberattacks, setting up "zombie botnets" and "stepping stones" around the world to launch attacks on network servers, network terminals, exchangers and routers, as well as a huge amount of industrial control equipment.
❗️Unlike the West, #Russia was not behind the colour revolutions in the post-Soviet space. It was not Russia who has been interfering in the affairs of #African states for 60 years, unseating dozens of unwanted leaders & building a neo-colonial network of influence pic.twitter.com/kIJBVRk3nn
The 360 company obtained multiple samples of relevant cyberattack weapons, noting that most of these samples followed the development standards and technical specifications that have been referred to in Vault 7 documents. So far, only the CIA strictly observes these standards and specifications in developing attack weapons.
The Chinese technical team obtained a sample of an information interception tool that is exclusively used by the U.S. National Security Agency (NSA), indicating that the CIA and the NSA may jointly attack the same target, share attack weapons with each other, or provide technological or personnel assistance to each other.
The cyberspace hegemony under U.S. manipulation is shadowing the entire world, with the CIA launching automated, systematic and intelligent attacks worldwide, the report said.
After analyzing relevant cases, the technical team found that the reach of such attack weapons has covered almost all internet and Internet of Things assets, making a foreign country's network and important and sensitive information susceptible to U.S. control or espionage, the report said, adding that the United States is a genuine "empire of hackers."
#Russia | The government said Ukraine tried to attack the Kremlin in Moscow with drones to kill President Vladimir Putin and warned of retaliatory measures against Kiev. pic.twitter.com/QAWh8rr2T1