{"id":8003,"date":"2024-03-02T20:22:18","date_gmt":"2024-03-03T03:22:18","guid":{"rendered":"https:\/\/weno.duckdns.org\/?p=8003"},"modified":"2024-03-02T20:22:25","modified_gmt":"2024-03-03T03:22:25","slug":"%e4%b8%ad%e5%9b%bd%e4%b8%89%e5%a4%a7%e5%9b%bd%e4%bc%81%ef%bc%9a%e5%90%91%e4%b8%96%e7%95%8c%e7%9b%97%e7%aa%83%e3%80%81%e5%90%91%e4%b8%96%e7%95%8c%e4%be%9b%e5%ba%94%e6%af%92%e5%93%81%e3%80%81%e5%90%91","status":"publish","type":"post","link":"https:\/\/weno.duckdns.org\/?p=8003","title":{"rendered":"\u4e2d\u56fd\u4e09\u5927\u56fd\u4f01\uff1a\u5411\u4e16\u754c\u76d7\u7a83\u3001\u5411\u4e16\u754c\u4f9b\u5e94\u6bd2\u54c1\u3001\u5411\u4e16\u754c\u4f20\u64ad\u75c5\u6bd2 3 of China&#8217;s major national business are stealing from the World, drug supplying to the World , Spreading Virus to the World"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.scmp.com\/week-asia\/opinion\/article\/3253873\/chinas-i-soon-data-leak-exposes-risks-outsourcing-state-spy-operations-hackers-hire\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.scmp.com\/week-asia\/opinion\/article\/3253873\/chinas-i-soon-data-leak-exposes-risks-outsourcing-state-spy-operations-hackers-hire<\/a><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>A data dump of files from Chinese firm i-Soon revealed alleged hacking exploits, in an incident reminiscent of Edward Snowden\u2019s case\nLike the West, Beijing is finding out the hard way the perils and advantages of outsourcing to private firms to maintain plausible deniability<\/code><\/pre>\n\n\n\n<p>A massive data leak that hit a Chinese cybersecurity firm earlier this month, exposing alleged hacking and intelligence operations, has showcased how even China\u2019s spy agencies rely on private contractors to do its bidding.<\/p>\n\n\n\n<p>On February 16, a total of 571 files allegedly containing hacking exploits and internal conversations from Shanghai Anxun Information Company (i-Soon) appeared on open-source repository GitHub, revealing what The New York Times called \u201ca rare look inside the secretive world of China\u2019s state-backed hackers for hire\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/cdn.i-scmp.com\/sites\/default\/files\/d8\/images\/canvas\/2024\/03\/01\/2de3706c-9d52-423a-ab2b-592d263b62c3_1126e908.jpg?w=640&#038;ssl=1\" alt=\"\"\/><\/figure>\n\n\n\n<p>Like past incidents involving compromising data leaks, this data set took on a life of its own. Despite swift action by GitHub to block access to the leaked data over policy violations, the repercussions will echo across intelligence agencies, media circles, academia and security pundits for the foreseeable future.<\/p>\n\n\n\n<p>\u4e2d\u56fd\u516c\u53f8 i-Soon \u7684\u6587\u4ef6\u6570\u636e\u8f6c\u50a8\u63ed\u793a\u4e86\u6d89\u5acc\u9ed1\u5ba2\u653b\u51fb\u7684\u4e8b\u4ef6\uff0c\u8fd9\u8ba9\u4eba\u60f3\u8d77\u7231\u5fb7\u534e\u00b7\u65af\u8bfa\u767b\u7684\u6848\u4ef6<br>\u4e0e\u897f\u65b9\u56fd\u5bb6\u4e00\u6837\uff0c\u5317\u4eac\u6b63\u5728\u8270\u96be\u5730\u8ba4\u8bc6\u5230\u5916\u5305\u7ed9\u79c1\u8425\u4f01\u4e1a\u7684\u98ce\u9669\u548c\u4f18\u52bf\uff0c\u4ee5\u7ef4\u6301\u8c8c\u4f3c\u5408\u7406\u7684\u63a8\u8bff<br>\u672c\u6708\u65e9\u4e9b\u65f6\u5019\uff0c\u4e00\u5bb6\u4e2d\u56fd\u7f51\u7edc\u5b89\u5168\u516c\u53f8\u906d\u9047\u5927\u89c4\u6a21\u6570\u636e\u6cc4\u9732\uff0c\u66b4\u9732\u4e86\u6240\u8c13\u7684\u9ed1\u5ba2\u548c\u60c5\u62a5\u64cd\u4f5c\uff0c\u8fd9\u8868\u660e\u5373\u4f7f\u662f\u4e2d\u56fd\u7684\u95f4\u8c0d\u673a\u6784\u4e5f\u4f9d\u8d56\u79c1\u4eba\u627f\u5305\u5546\u6765\u6267\u884c\u5176\u547d\u4ee4\u3002<\/p>\n\n\n\n<p>2 \u6708 16 \u65e5\uff0c\u5f00\u6e90\u5b58\u50a8\u5e93 GitHub \u4e0a\u51fa\u73b0\u4e86\u603b\u5171 571 \u4e2a\u636e\u79f0\u5305\u542b\u4e0a\u6d77\u5b89\u8fc5\u4fe1\u606f\u516c\u53f8 (i-Soon) \u7684\u9ed1\u5ba2\u653b\u51fb\u548c\u5185\u90e8\u5bf9\u8bdd\u7684\u6587\u4ef6\uff0c\u63ed\u793a\u4e86\u300a\u7ebd\u7ea6\u65f6\u62a5\u300b\u6240\u79f0\u7684\u201c\u7f55\u89c1\u7684\u7aa5\u63a2\u4e86\u9ed1\u5ba2\u4e16\u754c\u7684\u79d8\u5bc6\u201d\u3002 \u4e2d\u56fd\u653f\u5e9c\u652f\u6301\u7684\u96c7\u4f63\u9ed1\u5ba2\u201d\u3002<\/p>\n\n\n\n<p>\u4e0e\u8fc7\u53bb\u6d89\u53ca\u6570\u636e\u6cc4\u9732\u7684\u4e8b\u4ef6\u4e00\u6837\uff0c\u8be5\u6570\u636e\u96c6\u4e5f\u5177\u6709\u81ea\u5df1\u7684\u751f\u547d\u529b\u3002 \u5c3d\u7ba1 GitHub \u8fc5\u901f\u91c7\u53d6\u884c\u52a8\u963b\u6b62\u5bf9\u8fdd\u53cd\u653f\u7b56\u7684\u6cc4\u9732\u6570\u636e\u7684\u8bbf\u95ee\uff0c\u4f46\u5728\u53ef\u9884\u89c1\u7684\u672a\u6765\uff0c\u5176\u5f71\u54cd\u5c06\u5728\u60c5\u62a5\u673a\u6784\u3001\u5a92\u4f53\u754c\u3001\u5b66\u672f\u754c\u548c\u5b89\u5168\u4e13\u5bb6\u4e2d\u5f15\u8d77\u5171\u9e23\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/cdn.i-scmp.com\/sites\/default\/files\/styles\/1200x800\/public\/d8\/images\/canvas\/2024\/03\/01\/b2fc7891-d8f6-4dc3-b1d4-887e960d6519_18a19442.jpg?w=640&#038;ssl=1\" alt=\"\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/www.scmp.com\/week-asia\/opinion\/article\/3253873\/chinas-i-soon-data-leak-exposes-risks-outsourcing-state-spy-operations-hackers-hire A massive data leak that hit a Chinese cybersecurity firm earlier this month, exposing alleged hacking and intelligence operations, has showcased how even China\u2019s spy agencies rely on private contractors to do its bidding. On February 16, a total of 571 files allegedly containing hacking exploits and internal conversations&#8230;<\/p>\n","protected":false},"author":2,"featured_media":7882,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[514,119,252,86,114,100,513],"tags":[665,170,568,428],"class_list":["post-8003","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-china-says-everything-in-the-world-is-chinese-except-for-the-coronavirus","category-cultural-thieves","category-fake-country","category-hong-kong","category-wuhan","category--belt-and-road","category-513","tag-all-virus-comes-from-china-","tag-brainwashed_chinese","tag-china-drug-spread-to-the-world-","tag-china_steal_everything_from_world"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/weno.duckdns.org\/wp-content\/uploads\/2024\/02\/image_fx_china_collapsing_buildings_bridges_flooding_i3.jpg?fit=1080%2C1080&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=\/wp\/v2\/posts\/8003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8003"}],"version-history":[{"count":0,"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=\/wp\/v2\/posts\/8003\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=\/wp\/v2\/media\/7882"}],"wp:attachment":[{"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/weno.duckdns.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}