The Hack That Made China a Superpower: Operation Shady Rat

Sdílet
Vložit
  • čas přidán 20. 06. 2024
  • Operation Shady Rat - the hacking operation that changed the world forever. It all began in 2006, when an employee of a construction company in South Korea received an email with an attachment.
    🎯 Subscribe to ‪@cybernews‬ for more AI news and cybersecurity updates: cnews.link/subscribe/
    🎪 Looking for entertainment and interesting stories? Check out our playlists filled with captivating content that will keep you entertained for hours:
    • Infamous Hacks
    • Cyber Tops
    • Cyber Crime
    📰 Stay up-to-date with the latest cybersecurity news and trends by checking out our curated news playlist. We cover the latest threats, trends, and insights from the world of cybersecurity:
    • Latest NEWS
    💬 Stay connected with us on social media for the latest news, insights, and discussions around cybersecurity: linktr.ee/Cybernews
    💌 Stay up-to-date on the latest cybersecurity trends and news by subscribing to our Cybernews: • Latest NEWS
    📷 Thinking of purchasing a camera? Check out what is the best camera for you - cnews.link/best-cameras/y27B-...
    00:00 Intro
    01:54 How Operation Shady Rat Started
    05:06 Unit 61398
    07:56 Why Shady Rat Happened?
    10:19 The New Rats
    🥷 Secure your online activities - Check out a VPN with the best discount - cnews.link/get-nordvpn/y27B-s...
    🔑 Keep your accounts safe - Get THE BEST password manager offer - cnews.link/get-nordpass/y27B-...
    🦠 Protect your devices - Grab an EXCLUSIVE Antivirus deal - cnews.link/get-bitdefender/y2...
    Image Credits: drive.google.com/file/d/1OzQ6...
    ℹ️ About us
    We are an independent news outlet with a CZcams channel that posts cybersecurity & tech news videos daily. Our foremost concern is the safety and security of our viewers around the world. We remain vigilant on the issue of hacking and will provide updates as they become available. A number of our investigations and reports have been featured by industry-related publications and global news leaders like Forbes, PC mag, and Techradar.
  • Věda a technologie

Komentáře • 1,5K

  • @cybernews
    @cybernews  Před 8 měsíci +367

    Let us know if you would like to see more explainers like this!

    • @michaelmayhem350
      @michaelmayhem350 Před 8 měsíci +2

      Why isn't Joe hosting this?

    • @cerealpeer
      @cerealpeer Před 8 měsíci +4

      now this is an explainer that i wanted to see

    • @ytg6663
      @ytg6663 Před 8 měsíci +1

      Yep. I love to watch explainers like these lengthy video > 20 min as movie 🍿😊😊

    • @ytg6663
      @ytg6663 Před 8 měsíci +1

      always

    • @amiyoghosh
      @amiyoghosh Před 8 měsíci +1

      I love it!

  • @mikelbrenn111
    @mikelbrenn111 Před 7 měsíci +602

    Lockheed Martin billion dollar technology and yet bought an ebay network security.

    • @DoomCycle
      @DoomCycle Před 4 měsíci +57

      Greed breeds stupidity

    • @isenewotheophilus6485
      @isenewotheophilus6485 Před 4 měsíci +44

      the biggest vulnerability in a system is humans

    • @heijimikata7181
      @heijimikata7181 Před 2 měsíci

      @@isenewotheophilus6485 And money. Once money is involved, a lot of things become clearer for people who want to investigate these strange “anomalies” in national security.

    • @RPcropland
      @RPcropland Před 2 měsíci

      @@isenewotheophilus6485stupid humans not humans in general

    • @goolgal1638
      @goolgal1638 Před měsícem

      If the us doesn't force a security standard, companies wont enforce it.

  • @SSS-sz8mg
    @SSS-sz8mg Před 7 měsíci +80

    Moral of the story, never ever use Windows OS for the work!

    • @edgeldine3499
      @edgeldine3499 Před měsícem +6

      It would have still happened... Why? Because people still clicked on the emails.

    • @ashenabeysinghe4767
      @ashenabeysinghe4767 Před 29 dny +9

      Linux is not 100% immune. But it is way better than Windows. I've seen even some ATM machines running on Windows XP.

    • @Vivi-xn9iz
      @Vivi-xn9iz Před 12 dny

      @@ashenabeysinghe4767 most ATM machines run on windows XP. In fact, a grand majority of similar systems run on windows XP

    • @chawlagrv
      @chawlagrv Před 4 dny +1

      if your computer has access to internet and ability to run background job, it doesn't matter what OS you are on.

  • @terrywong7879
    @terrywong7879 Před 7 měsíci +1373

    You mean to tell me that NSA, PRISM and all the other hackers didn't catch that. The US budget is over 50 billion for US hackers. Other countries are better?

    • @clearheaded5696
      @clearheaded5696 Před 7 měsíci +518

      Well, this empire is very good in a few thing, namely writing story, telling it convincingly and make believe for their tax payer to support more money spent on new projects in the name of National Security, right.

    • @PriyanshuThakur-iv5ll
      @PriyanshuThakur-iv5ll Před 7 měsíci +150

      ​@@clearheaded5696huhh an American who knows truth

    • @waNErBOY
      @waNErBOY Před 7 měsíci +139

      you cant buy talent, the US has been trying to do so for long.

    • @foxtraner
      @foxtraner Před 7 měsíci +20

      dont take it seriously, reasoning with these people makes no sense, people only believe what they want to believe and content creator only wants money out of it.

    • @rv8804
      @rv8804 Před 7 měsíci +59

      Did u not watch the video? They specifically said that they knew about it when the Snowden leaks came out.

  • @hdogdizzy720
    @hdogdizzy720 Před 8 měsíci +287

    Please post more content like this weekly.

    • @hdogdizzy720
      @hdogdizzy720 Před 8 měsíci +4

      Wonderful video

    • @Andreas_linden
      @Andreas_linden Před 7 měsíci +8

      Work 24/7 😂😂

    • @neanda
      @neanda Před 6 měsíci +3

      100% agree, thiis one of the best videos i've seen in a long time

    • @SpunckyJew6969
      @SpunckyJew6969 Před 5 měsíci

      ​@@Andreas_linden serve the hive mind, right? Not a chance, I say. Ridiculous

  • @banalresentive6523
    @banalresentive6523 Před 5 měsíci +699

    Regarding F35 design theft: When I worked for Defence companies, it was standard for all classified data and software to be stored on locked-down air-gapped systems. Avoiding those DOD mandates could get you free room and board at a federal facility for several years (IF you didn't have the right contacts, see case of Sandy Burger). Have the security rules been relaxed? Have we gotten that stupid? If this was willful stupidity on the part of Lockheed Martin staff, they should VERY PUBLICLY be convicted and sent to the Big House. I font

    • @banalresentive6523
      @banalresentive6523 Před 5 měsíci +23

      Continued - edit session was aborted somehow. I don't care if the top responsible person was the CEO of LM.

    • @beayn
      @beayn Před 5 měsíci +52

      I believe it's usually mistakes. Temporary systems set up for testing purposes and forgetting to remove them.
      Files copied from air gaped server for research but forget to remove them from the connected server etc.
      That said I don't know what happened in this case.

    • @andrewsandoval2685
      @andrewsandoval2685 Před 5 měsíci

      Simple, you don't go after Lockheed you go after their part vendors. China realized that if you go after the small businesses that have a DoD connection you can effectively unveil all the parts and pieces that go into it. Don't try to steal the schematics for the radar system find the business that manufactures them for both Military and Civilian. Can't crack those guys? go for the ones that lost the contract to the other guys they're probably worse but it beats expending the billions in research that goes into it.
      Software is the biggest kicker and most likely the most secure, that's developed in house however with AI you can now supercharge it.
      China can copy American design and manufacturing but they're just cheating. They won't actually learn anything or why we developed or how which ironically makes them rely on the U.S.
      China is quite literally leeching off the money of the American tax payer

    • @andrewsandoval2685
      @andrewsandoval2685 Před 5 měsíci +76

      This all happened pre-Snowden before 2007 back when sub-contractors kept kicking the bucket in regards to security. When the F35 incident happened the DoD lost it's collective shit and cracked down.

    • @stussymishka
      @stussymishka Před 5 měsíci +4

      yes makes me sick

  • @criptovida
    @criptovida Před 7 měsíci +557

    China became smarter when they started using local technology companies. The US still has higher access to other countries as they can inject any RAT along with Windows OS which the majority of countries do use in their critical infrastructures.

    • @douglascampbell4993
      @douglascampbell4993 Před 7 měsíci

      yeah the west doesnt work like that operationally. state and business isnt connected the way it is in say China, russia, North Korea etc. They dont have access to OS development at all, They have tried to have backdoor access for law inforcement but its just not a good business plan and customer confidence is king, so only an idiot would grant the government that kind of access! Just ask any Hong Kong citizen.. lmao..

    • @criptovida
      @criptovida Před 7 měsíci

      @@douglascampbell4993 Maybe not, but it's arguable. China does use some western cloud solutions like Azure but only hosted in Chinese data centers managed my Chinese companies.

    • @aaraviii
      @aaraviii Před 7 měsíci +84

      Heard of Linux? "Critical" infrastructures nowadays don't use good old Windows anymore

    • @criptovida
      @criptovida Před 7 měsíci

      You might be talking abou the west, I have worked in many emergent countries and most services do run on Windows even airports. FYI there are ATM machines running Windows XP still, many countries have stopped in the stone age.@@aaraviii

    • @djamaldossantos1624
      @djamaldossantos1624 Před 7 měsíci +92

      ​@@aaraviiiThat would be good if people acted smart. And if there's something you cannot underestimate is human capacity to make stupid decision in key infrastructure

  • @wavydavy9816
    @wavydavy9816 Před 6 měsíci +658

    Every single one of these companies could have avoided all this trouble by spending more money on security rather than just 'hoping' that the measures they had in place would be good enough.

    • @jordanedmond5618
      @jordanedmond5618 Před 6 měsíci +1

      Or simply cut off China from the internet, and block all access from China to the US

    • @EB-73-
      @EB-73- Před 6 měsíci +59

      Very ignorant comment. The age old adage rings true, if you build it, they will come.
      This isn't ancient China with Mongols on horseback. The threat, as was just explained to you, is persistent, and ever evolving.
      Cold war never ended mate.

    • @wavydavy9816
      @wavydavy9816 Před 6 měsíci +27

      @@EB-73- Excuses excuses.
      Being proactive costs money so there's a cut off point where companies know that they need security but it's cheaper to just cross your fingers, hope for the best, and pay off individuals who _do_ get screwed over.
      Or, if you like, you can just pretend that doesn't happen.
      Very ignorant comment 😂

    • @EB-73-
      @EB-73- Před 6 měsíci +50

      @@wavydavy9816 Point being is that security itself is an illusion. As you so kindly point out, no amount of money is ever enough. At some point you HAVE to cross your fingers and call it good.
      If you want the gods honest truth, the best security would have been not to go digital in the first place. Or maintain a closed loop system. Both of which cost next to nothing by comparison.
      Once you open yourself up to attack it's impossible to ever say with certainty that it won't come.
      Perhaps that concept is a bit difficult for you to reconcile.

    • @wavydavy9816
      @wavydavy9816 Před 6 měsíci

      @@EB-73- I own a nice motorbike which I have to park on the street.
      I have done everything possible to make sure that nobody can steal my motorbike and get away with it.
      It has taken a lot of money and effort to get to that stage, some might even say that I've gone too far with my security (which, admittedly, makes it slightly inconvenient to use my motorbike).
      A team of people who specifically set out to steal _my_ motorbike and circumvent the various devices fitted would indeed be able to steal it, given an unrealistic amount of time, then they'd have to store it underground to stop the tracker working to avoid recovery
      I can confidently say that I'm not worried about my bike being stolen, because I've taken those measures myself, and that's being pro-active. I can measure the amount of hassle potential bike thieves face compared to how much profit they are likely to make, seee the cut off point and act accordingly.
      Banks and other financial institiutions definitely don't care about their customer's investments as much as I care about my motorbike, and THAT'S the difference.
      If they _really_ wanted to they could do it no problem 🤷‍♂

  • @nazmdar
    @nazmdar Před 5 měsíci +167

    This is exactly what US has done to Iran by developing Stuxnet worm. It was one of the most sophisticated attacks to the control system of an industrial plant.

    • @shinigamirenegade
      @shinigamirenegade Před 3 měsíci +2

      Boy sheer havoc. Darknet diaries episode was crazy.

    • @axenik
      @axenik Před 3 měsíci

      Iranian nuclear development is hardly a positive and beneficial organization as U.S. industries.

    • @kentlu4781
      @kentlu4781 Před 3 měsíci +18

      NSA: focus on hacking others, too busy to take care of the domestic cybersecurity🐶😎

    • @adreiiaii510
      @adreiiaii510 Před měsícem

      @@kentlu4781 In fairness to NSA employees, this isn't really their fault.
      The NSA is structured as a surveillance and code-breaking agency. That's *all* they do.
      The NSA works with US Cyber Command to engage in Offensive Security practices (as well as conduct Cyber Warfare Operations, but... shh, they aren't supposed to do that).
      CISA (CyberSecurity & Infrastructure Security Agency) is the agency responsible for US Federal Cyber Security and infrastructure.

    • @OEFarredondo
      @OEFarredondo Před 29 dny

      This seems far worse. One factory in Iran vs thousands of stolen industrial secrets...

  • @wseam1
    @wseam1 Před 5 měsíci +19

    TL;DR they aren’t that smart, we’re just that stupid.

  • @smallpeople172
    @smallpeople172 Před 7 měsíci +116

    That Lockheed Martin employees face when he found out what happened must have been… *chefs kiss*

    • @neanda
      @neanda Před 6 měsíci +21

      i was thinking that too, he just gave the chinese the plans for their most advanced fighter jet. i'm sure he left that accomplishment out of his CV

    • @smallpeople172
      @smallpeople172 Před 6 měsíci +17

      @@neanda reminds me of the NASA intern who dropped a wrench six stories down onto the Shuttle heat shield, causing millions in damages and weeks in repairs. Guy was fired before he got off the elevator.

    • @beayn
      @beayn Před 5 měsíci +8

      I'm guessing the person who clicked the mail wasn't the only one at fault. Someone left the plans in a place that was easily accessible as well. It's nearly always a series of mistakes.

    • @twavee
      @twavee Před 5 měsíci +2

      @@smallpeople172 Those two don't compare well. One could be interpreted as a civil mistake for civil penalties, and the other can be interpreted as being traitorous.

    • @smallpeople172
      @smallpeople172 Před 5 měsíci +1

      @@twavee interpretation depends on intent

  • @Kekoa1207
    @Kekoa1207 Před 5 měsíci +12

    Got my sub on the first vid. The visuals, even the simple ones, were really insightful

  • @matthewexline6589
    @matthewexline6589 Před 5 měsíci +36

    Roman proverb: "Opportunity makes the thief.". As long as America continues to blame other countries for it's own shortcomings progress won't come. Face facts: You're responsible for your own vulnerabilities.

  • @railfan_3371
    @railfan_3371 Před 7 měsíci +108

    Who had the "brilliant" idea of hooking up the controls of the most important infrastructure in the world to the internet?

    • @notanymore9471
      @notanymore9471 Před 7 měsíci +20

      Well it’s mostly engineering portals for remote access and monitoring of systems. But security is often light or non existent in these areas.

    • @realmemegalactic
      @realmemegalactic Před 6 měsíci +5

      Bill gates

    • @sepg5084
      @sepg5084 Před 6 měsíci +8

      ​@@realmemegalacticand the Bush republican government.

    • @kanalisationerstellen
      @kanalisationerstellen Před 5 měsíci +7

      the IT departments that get paid by American companies i feel like to put everything into the cloud :)

    • @Heeroyui752
      @Heeroyui752 Před 5 měsíci +8

      Remote monitoring is needed to catch problems before they start impacting public health.

  • @smokinjoe6911
    @smokinjoe6911 Před 5 měsíci +27

    We do not have to put our infrastructure on the net to begin with. Seems to be a security risk easily explored. Why risk National Security for convenience?!?

    • @michaelpelzek8882
      @michaelpelzek8882 Před 5 měsíci +6

      Exactly! I saw somebody say, well it stifles innovation. Maybe, but I would rather it take an extra year or two then have our enemies also be able to use the same weapons technology we do. You cant have it both ways.

  • @rschloch
    @rschloch Před 6 měsíci +45

    That screensaver sound laughable, but I worked for a company who had a corporate screensaver.

    • @Dwigt_Rortugal
      @Dwigt_Rortugal Před 5 měsíci +7

      It's baffling how many "advanced" and highly educated users fall for the most basic social engineering. People can be absolutely brilliant and yet completely naive and ignorant.

    • @rschloch
      @rschloch Před 5 měsíci

      @@Dwigt_Rortugal yeah. I think a lot of people are in „get it done mode“ and mindlessly click m-on and react-to every email.

    • @a8f235
      @a8f235 Před 4 měsíci

      @@Dwigt_Rortugal CuteCatVideo.exe just install...Uhm, I mean just open a watch 🤨😅 Yup, there's no shortage of naiv people so hackers or scammers don't need much of a brain at all. They just hammer out the same bs by the millions, and they know they will have positive hits even how foolish it is.

    • @jyy9624
      @jyy9624 Před 3 měsíci

      It's like a website cypher

  • @blehbleh9283
    @blehbleh9283 Před 5 měsíci +103

    10:51 hilarious that this is presented as a logical fallacy in the context of geopolitics. If you're a global power, you should be hacking, and hacking well

    • @vaakdemandante8772
      @vaakdemandante8772 Před 5 měsíci

      @@albertkirilov6921 what is there more to say? Nations that matter on the world stage are doing hacking regardless of any laws, either domestic or international. Just because some official document states they aren't means nothing. I mean, maybe it does to the gullible public but not to the people who are in the know.

    • @nodaxxing
      @nodaxxing Před 5 měsíci +13

      Logical fallacies were originally designed by Aristotle cuz he was essentially a Destiny debate-lord. He’d go to public squares to debate people and put both their social reputation on the line, and you can imagine who won the most. their purpose is not to prove anything or make any sort of meaningful point, it is to discredit the opposing sides point without actually attacking it, just the logical structure of it; which is different than saying something is illogical. Way too many people equate logical fallacies with illogical. Illogical means that there are missing steps, claims of logical fallacies attack the steps you are taking instead of the destination. Claiming that something is a logical fallacy might win over the majority of people, but in any sort of competition you want to be doing as much if not more than your opponent. Good fear mongering though keep it up 🎉

    • @salj.5459
      @salj.5459 Před 5 měsíci +10

      @@nodaxxingSocrates was the original annoying debate lord. He was so hated he got killed for it

    • @nicholaspearse2222
      @nicholaspearse2222 Před 5 měsíci +4

      @@nodaxxingall that typing for a fallacy fallacy 😂😂😂

    • @HughEtl
      @HughEtl Před 5 měsíci

      @@nodaxxingdo you not agree with his statement tho

  • @harmonicspice2536
    @harmonicspice2536 Před 5 měsíci +19

    I didn't get the fallacy part? Why is the argument wrong? " If the US conducts them, why shouldn't we " 10:53

    • @s.v.discussion8665
      @s.v.discussion8665 Před 3 měsíci +7

      It is not.

    • @andrewzhao444
      @andrewzhao444 Před 3 měsíci +5

      It is a fallacy on an individual moral level. Assuming that an action is immoral, other people being immoral does not change that fact. This is true for criminals, for example. Other criminals existing does not absolve any person of their crimes.
      It is a fair argument on a social level. The argument distilled is that one party is being unequally held accountable for an action that everyone does. Typically these actions are wrong on an individual level, but necessary evils on country level. All countries kill people. If you only ever target one country for killing people, that is not a fair criticism, but just a social attack.

  • @Collinmcspirit
    @Collinmcspirit Před 5 měsíci +9

    3:30 - RuneScape Dragon Scimitar haha.. brings back memories

    • @JoeRogansForehead
      @JoeRogansForehead Před 3 měsíci +1

      Haha screw doing Monkey Madness to wield that thing

  • @MrNedinator
    @MrNedinator Před 6 měsíci +15

    love the dragon scimmy as the cursor lmao. reminds me of the old hack videos on YT back in 2010ish era :P

  • @Swess2908
    @Swess2908 Před 5 měsíci +39

    China has a point there. If someone else does it why cant they.

    • @rallinrallen8040
      @rallinrallen8040 Před 17 dny +1

      As long as you are a nuclear threat then you can do what ever you want

    • @EM-oe2lz
      @EM-oe2lz Před hodinou

      @@rallinrallen8040 Actually true

  • @BetaProductionz
    @BetaProductionz Před 7 měsíci +34

    “This is CEO open file” is the Chinese equivalent of “show bobs” lol

    • @GTFO_0
      @GTFO_0 Před 7 měsíci +4

      😭😭lmao i can't 😂😂😂bro comon
      Don't have to Do our indian broa like that

    • @PluetoeInc.
      @PluetoeInc. Před 6 měsíci

      ​@@GTFO_0 💀 OP is dumb af and he knows it look at his pfn , but the broken English part is legit tho

    • @guydreamr
      @guydreamr Před 5 měsíci

      *shows boobs*

  • @davejoseph5615
    @davejoseph5615 Před 5 měsíci +6

    Why would anyone be dumb enough to ask the e-mail sender if the file attachment is legit?

    • @qdaniele97
      @qdaniele97 Před 5 měsíci +2

      There is (or was) plenty of troians that used to spread themselves by running through yous email contacts and sending copies of itself to them.
      But they obviously weren't able to properly reply to a question like a human would.
      Those poor guys thougth the person on the other side was one of their collegues and asked if they were the ones that sent the mail and not some software, when they found that they were talking to an actual human everything suddenly seemed fine to them.

  • @lmlm1234ful
    @lmlm1234ful Před 7 měsíci +9

    This is the Art of War!

  • @universemath
    @universemath Před 7 měsíci +76

    love the storytelling and the narration

    • @cybernews
      @cybernews  Před 7 měsíci +1

      Thank you for the kind words!

    • @2HN.
      @2HN. Před 7 měsíci +3

      @@cybernews 7:00 "Their attacks were brazen and aggressive. Relying more on poor cybersecurity of victims..."
      So, it was just a marketing stunt for antivirus software companies?

  • @factsoverfeelings1776
    @factsoverfeelings1776 Před 7 měsíci +14

    Western nations using it for manufacturing made it a super power.

  • @sabercruiser.7053
    @sabercruiser.7053 Před 7 měsíci +1

    Thank you much greatful 👍👍🙌🙌👏👏

  • @Drenicite
    @Drenicite Před 5 měsíci +3

    Treat research sounds like a sweet gig

  • @nameismetatoo4591
    @nameismetatoo4591 Před 5 měsíci +41

    I'd be willing to be that most of these companies/organizations that were victims of Shady Rat had at least one employee raise concerns about their poor infosec to a superior, and were promptly ignored. The people in charge often don't understand anything about this kind of stuff, and don't like it when someone below them knows more than they do. Thankfully that's been slowly changing over the last decade, but it's always going to be a problem to some extent.

    • @eskileriksson4457
      @eskileriksson4457 Před 4 měsíci +1

      It's the Dunning-Kruger effect. Which will never go away, unless we let AI run the show.

    • @truthboom
      @truthboom Před 14 dny

      @@eskileriksson4457 they will just use quantum computer boosted AI to override the other AI

  • @mykey49
    @mykey49 Před měsícem +3

    At the same time there was a purge of all CIA human assets in the Chinese mainland, Hong Kong and Macau. The US has never recovered since again.

  • @user-ed7hd1xh6x
    @user-ed7hd1xh6x Před 4 měsíci +1

    A great little documentary! A++

  • @CanadianFitted
    @CanadianFitted Před 7 měsíci +152

    Great video brother 🔥 Been trying to tell people about this for years , the Chinese are also hyper focused on a quantum computer, pouring more resources and money into the project than anyone else. You could probably speculate the implications of that more than I could but it’s not great 😁

    • @user-dc1ud6px3s
      @user-dc1ud6px3s Před 7 měsíci +11

      It would be analogous to the cracking of the Enigma and JN25 codes.

    • @kylorenkardashian79
      @kylorenkardashian79 Před 6 měsíci +14

      they already have it, it's called Jiuzhang1 & Jiuzhang2.
      their quantum computer is different than ours, they use lasers & mirrors, it's a double slit delayed choice setup on steroids

    • @neanda
      @neanda Před 6 měsíci +2

      @@kylorenkardashian79 omg i'll have to find out more about this. i like that analogy

    • @shashankdixit8949
      @shashankdixit8949 Před 6 měsíci +2

      ​@kylorenkardashian79 nobody has a quantum computer lol it would take another 20 years to have one

    • @Jem_Apple
      @Jem_Apple Před 5 měsíci

      ⁠@@shashankdixit8949literally every major player has quantum computers. U can even get access online 😂

  • @zapoyou2
    @zapoyou2 Před 5 měsíci +13

    3:30 with the RuneScape dragon scimitar 😂😂😂

  • @ParitoshTripathiOfficial
    @ParitoshTripathiOfficial Před 8 měsíci +9

    back again, always like these type of vids.

  • @davecullins1606
    @davecullins1606 Před 5 měsíci +131

    At this point it must ironically be safer to just store the most important and most classified information solely in a seriously sealed chamber, that almost nobody knows about, underground with meters thick concrete walls. No copy on any computer at all.
    It's probably how some of those things are already being handled.

    • @misosalmonfromthecheesecak3387
      @misosalmonfromthecheesecak3387 Před 5 měsíci +16

      B21 bomber schematics and nuclear secrets I reckon

    • @TheBorg01
      @TheBorg01 Před 5 měsíci +5

      even the electric cable one day will be used to hack machines so it would have to be off the grid too lol

    • @dzungtran314
      @dzungtran314 Před 5 měsíci +22

      But doing so makes it impossible for our own scientists to learn and improve upon those designs. Science progress depends on collaboration. So there is no easy way

    • @rdablock
      @rdablock Před 5 měsíci

      I mean the leak benefits everyone. The Chinese get their blueprints and the DoD and MIC gets to bang their drums to the tunes of trillions

    • @twenty-fifth420
      @twenty-fifth420 Před 5 měsíci

      ⁠@@dzungtran314I mean, it depends. Scientists didn’t seem to have a problem innovating a literal bombshell in the Manhattan Project. That isn’t the issue though, I think you missed it.
      The issue is if you have any classified information, one that is a cognito hazard to the public at large, then you by definition trying to hide information. Scientists or not. Even politicians or not. You have to be either high up with the DOD, the FBI/CIA or the Armed Forces if it were a serious piece of information.
      The most secure location if you can’t encrypt your own data and protect it is ironically what OP said. A locked cabinet no one knows about. Data sanitation and security is still hard for the average person, it is why security researchers and scientists often raise the alarm when breaches in any network, private or public is made especially with Malware and Phishing.

  • @claudiamanta1943
    @claudiamanta1943 Před 2 měsíci

    10:23 Phew 😮‍💨 that’s reassuring.

  • @yesmhm69
    @yesmhm69 Před 5 měsíci +6

    All infrastructure should have analog redundancy if not be entirely non-network

  • @Cybersawz
    @Cybersawz Před 7 měsíci +15

    Awesome narration and video content! Subscribed!

  • @ok373737
    @ok373737 Před 5 měsíci +2

    Great video!

  • @odis_of_america
    @odis_of_america Před měsícem +1

    I enjoy watching your videos great job.

  • @flyinghippo519
    @flyinghippo519 Před 7 měsíci +24

    “There is no honour among thieves”.

    • @bluesclues132
      @bluesclues132 Před měsícem

      @mugbeer9440 already there - next stage is making it profitable and building brands .

  • @davidjrb
    @davidjrb Před 7 měsíci +17

    That was awesome. Really enjoyed it

  • @noneofyourbusiness8625
    @noneofyourbusiness8625 Před 2 měsíci

    Omg that dscim 07 scape cursor brought me back to my childhood 😢😢😢😢 custom moparscape clients makes me wanna cry a bit

  • @laddcraner4170
    @laddcraner4170 Před 5 měsíci +1

    Great content. More please....

  • @mchammer3927
    @mchammer3927 Před 7 měsíci +653

    I'm sure we never spy on any body ....

    • @Ahoooooooo
      @Ahoooooooo Před 7 měsíci +170

      😂 i am thinking the same ....
      The US is only sour because someone else did it better .
      Or they are playing the moral card , because no one has caught them yet 😅 .

    • @user-tf5nm8yq1h
      @user-tf5nm8yq1h Před 7 měsíci +2

      😂

    • @orbitaldebri66
      @orbitaldebri66 Před 7 měsíci

      Oh it's a given, we absolutely haven't spied on anyone.....😈👿🫅👿😈

    • @douglascampbell4993
      @douglascampbell4993 Před 7 měsíci +30

      @@Ahoooooooo lol.. Yeah we definitely should have just left the Japanese to keep doing their thing back in world war two.. 🤣😅

    • @GTFO_0
      @GTFO_0 Před 7 měsíci

      I mean china just caught spies of cia just a couple of days back 😂

  • @GarethDavidson
    @GarethDavidson Před 5 měsíci +11

    This could be solved by just making external hack attacks that do crypto mining but no damage or info theft are civil matters, not criminal, and any company that is hacked must report the intrusion or face huge fines. A free for all that forces everyone to tighten security overnight

  • @ThatGuyThatDiedToday
    @ThatGuyThatDiedToday Před 5 měsíci +28

    This video is great! If at all possible, please include source material for this/future informational videos. Sounds like it'd be a great read. After doing some searching it's proving rather difficult to find the source material

    • @w462dh
      @w462dh Před měsícem

      it is, because it is baseless, just storytelling, have fun watching!

  • @flyingllama87
    @flyingllama87 Před 8 měsíci +7

    Awesome Content. More like this.

  • @Ricky-pz4di
    @Ricky-pz4di Před 7 měsíci +53

    Please more of this! If possible even a bit technical (imo)

  • @TobiKellner
    @TobiKellner Před měsícem +2

    How exactly is "The US is doing it, so why shouldn't we?" a logical fallacy?

  • @user-gk9pw8ky6m
    @user-gk9pw8ky6m Před měsícem +1

    Very interesting video ❤ love from China

  • @redcat4321
    @redcat4321 Před 3 měsíci +3

    Why don’t they just disconnect from internet?? Can’t get hacked if there is no connection to outside.

  • @RoboticDragon
    @RoboticDragon Před 5 měsíci +4

    Fantastic video, very informative, thanks for sharing.

  • @tommyX.808
    @tommyX.808 Před 5 měsíci

    great intro. now i'm excited

  • @SO-fb4ef
    @SO-fb4ef Před měsícem

    Dragon scimitar, a man of culture I see...

  • @Nohandleyetf
    @Nohandleyetf Před 5 měsíci +11

    me: why are you avoiding my messages?
    her: I am taking counter measurements against Chinese spies.

  • @GauravKumar-fj7tp
    @GauravKumar-fj7tp Před 6 měsíci +25

    😂 I always thought that there was some high level shit going on with Lockheed but now I laugh looking at this

  • @mikediaz9033
    @mikediaz9033 Před měsícem

    Definitely.
    Extremely Brilliant.

  • @Dubiouscyclist
    @Dubiouscyclist Před 2 měsíci

    Subscribed!

  • @ladeedaa
    @ladeedaa Před 7 měsíci +13

    That's how we became a super power also!
    USA 🇺🇸 USA 🇺🇸

  • @cassiopesysg5423
    @cassiopesysg5423 Před 5 měsíci +17

    As a Shanghaiese I'm quite surprised to see they're actually doing such big things in that building.

  • @curious_one1156
    @curious_one1156 Před 2 měsíci +2

    The US is after Linux distros now. Since people have stopped using for critical infra, as the US introduces vulnerabilities in windows.

  • @govanisalaiz1019
    @govanisalaiz1019 Před 5 měsíci

    This will be on textbooks! I hope you get credited.

  • @ytg6663
    @ytg6663 Před 8 měsíci +7

    Awesome Explainer video. 👍👍👍

  • @Tryste
    @Tryste Před 8 měsíci +7

    Interesting honeypot story

  • @PaulSpades
    @PaulSpades Před 5 měsíci +1

    Amazing.

  • @JoeShmo4
    @JoeShmo4 Před 5 měsíci

    Great content

  • @HreForTheMusic
    @HreForTheMusic Před 5 měsíci +4

    If you enjoyed this you ahould read 'this is how they tell me the world ends'. It covers this an a whole lot more about the cyber arms race

  • @fahrrurrozi686
    @fahrrurrozi686 Před 7 měsíci +9

    USA: I never spy to anyone 😂

  • @rhenium1877
    @rhenium1877 Před měsícem +1

    is this what Mr.Robot was trying to show ?

  • @DeadSezSo
    @DeadSezSo Před 3 měsíci

    Man, you sure know how to tell a story. That intro was perfect: tells its own short story, grabs your attention, piques your curiosity then abruptly ends just as it reveals an answer that only raises more questions and increases the mystique...first video of yours I've watched but I was just blown away immediately. Not my typical content but you've got a new subscriber here!

  • @felixkiprop48
    @felixkiprop48 Před 7 měsíci +17

    How do you make such clip? the edit is perfect. Great video.

    • @cybernews
      @cybernews  Před 7 měsíci +3

      Thank you so much for the feedback!

  • @neanda
    @neanda Před 6 měsíci +30

    i hope this video and your channel gets to millions as it's info people and companies definately need to know.
    what an amazing video, best i've seen in a long time in terms of the insights and high production quality. this was quite an adveture. please do more like this, i'm gonna spend some time binging on your channel as I just discovered it today (and i'm in the tech iindustry as it's defo my kind of thing)

  • @mysteryY2K
    @mysteryY2K Před 7 měsíci

    i love this channel

  • @phlanxsmurf
    @phlanxsmurf Před 5 měsíci

    That last comment was scary. Really engaging video. Thanks, you just got a new sub. 😊

  • @Mark_nobody3
    @Mark_nobody3 Před 5 měsíci +5

    To sum it up
    “Thanks for giving me the keys to your house and now your system is mine”

  • @oscr8129
    @oscr8129 Před 7 měsíci +7

    DOES ANYONE REALISE HOW CHINA MAPLOOKS SO MUCH LIKE AMERICAN MAP

  • @SteveGarfunkle
    @SteveGarfunkle Před 5 měsíci +1

    This is a fantastic video. Well done.

  • @wongtan5089
    @wongtan5089 Před 7 měsíci

    Its very easy nowadays to get info on new tech, half of them are startups and people were advertizing their stuff everywhere

  • @elevationsickness8462
    @elevationsickness8462 Před 6 měsíci +18

    The f35 being stolen is such a massive L considering the whole point is how computerized and it is. Why didnt we listen to Battlestar Galactica😭

    • @erickgonzalez4698
      @erickgonzalez4698 Před 6 měsíci

      Battlestar? What do you mean?

    • @jan.tichavsky
      @jan.tichavsky Před 5 měsíci +6

      I don't think so. You can steal the hardware blueprints but getting the software and getting it working on copied hardware is much harder, not to mention you won't get any updates. Which why is Tesla vetting on fast innovation. By the time someone else copies their hardware and software it's already obsolete. And they certainly won't copy the massive servers for training and collecting data using another custom architecture.

    • @Gongolongo
      @Gongolongo Před 5 měsíci +2

      ​@@jan.tichavsky they did get the software at the time too

  • @konstantinrebrov675
    @konstantinrebrov675 Před 5 měsíci +10

    Such is the meaning of cold and ruthless pragmatism.

  • @Sv_edoni
    @Sv_edoni Před 3 měsíci

    6:53 What music is this? The background music sounds stylish to the topic

  • @Taskforce1
    @Taskforce1 Před 4 měsíci

    dragon scimmy cursor 🔥

  • @Lazerecho
    @Lazerecho Před 7 měsíci +9

    Cant spell China without CIA

    • @smoothbraindetainer
      @smoothbraindetainer Před 5 měsíci +2

      Ok and you can't spell "homeowner" without "meow" what's your point

  • @user-yc3zv6gp3w
    @user-yc3zv6gp3w Před 5 měsíci +5

    There are always holes in the infrastructure created by people. It is a difficult problem. The only way is reduce the attack surface, isolate data within a secure network and make convenience non existent. Only allow downstream traffic. Encryption at rest and transit between internal services. These are the things i can think about.

  • @itznukeey
    @itznukeey Před 9 dny

    Great video

  • @christianrandall5618
    @christianrandall5618 Před 7 měsíci

    My first video on this channel, amazing !

  • @fpxy00
    @fpxy00 Před 6 měsíci +7

    Nobody does this better than US gov. through its big tech companies.

  • @hurrikkkanes2533
    @hurrikkkanes2533 Před 7 měsíci +6

    takes one to know one 😂

  • @GustavoSilva-ny8jc
    @GustavoSilva-ny8jc Před 19 dny

    4:38 Okay, this is more pathetic negligence than genius of the attacker

  • @MicheleDamato-co7vh
    @MicheleDamato-co7vh Před 2 měsíci +2

    Considering America is the leader in hacking, I don't understand the storyline... whoever rules technology rules the world.....

  • @merounkidi8037
    @merounkidi8037 Před 7 měsíci +5

    the rats are in Palo Alto, CA as homeless people living in all saints church opposite chase bank near the city hall .

  • @DotADBX
    @DotADBX Před 4 měsíci +4

    Its why critical infrastructure and military assets should always be on a air gapped network, additionally having a fake network that lets you track your would be attackers and in turn hack them back is an ideal strategy

    • @wecx2375
      @wecx2375 Před 3 měsíci

      Nobody really cares.

  • @alicassidy8913
    @alicassidy8913 Před 7 měsíci

    If i receive anything with a link, I never hit it . I call who ever it is to verify first.

  • @tomasverheyen5341
    @tomasverheyen5341 Před 6 měsíci

    This video should get more views

  • @coder_rc
    @coder_rc Před 8 měsíci +3

    Loved it

  • @evolution686us
    @evolution686us Před 6 měsíci +4

    CIA does this all the time

  • @ecpgieicg
    @ecpgieicg Před 4 měsíci

    4:49 Anyone knows the soundtrack around this part of the documentary?

  • @GustavoSilva-ny8jc
    @GustavoSilva-ny8jc Před 19 dny

    0:44 HOLY SHIT!!!!! EVEN BRAZIL!!!!! "I apologize... i wasnt really familiar with your game"

  • @merounkidi8037
    @merounkidi8037 Před 7 měsíci +4

    all of Chinese military and officials have their original physical bodies in Titing a village in the sub division of Moutourwa in Cameroon