How Does the CIA Organize a Cyber ​​Attack?

How the CIA Conducts a Cyber ​​Attack
How the CIA Conducts a Cyber ​​Attack

New findings have emerged that prove how the US secret service, the CIA, has carried out cyber attacks on other countries.

The report, prepared jointly by China's National Computer Virus Emergency Response Center and China's cyber security company 360, revealed the CIA's cyber attacks in many countries, including China, and its attempts to steal confidential information.

In the report, it was determined that the CIA's cyber attacks targeted infrastructure facilities, aviation and space, scientific research institutions, petro-chemistry, internet companies and government bodies in the targeted countries, and that these attacks could be traced as early as 2011.

In the report, it was reported that trojan horse viruses closely related to the CIA were detected in cyber attacks targeting China, and that these viruses were managed by the CIA by being extremely standardized.

In the report, it was also determined that the weapons used by the CIA in its cyber attacks were subject to very strict espionage technology norms, could affect the internet of things with the entire cyber world, so the CIA could obtain important and sensitive data from other countries as much as it wanted.

In the report, it was announced that the joint research team consisting of the China National Computer Virus Emergency Response Center and 360 companies reported the cyber attacks to China's public security units.