"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2024-06-13T16:27:27Z"
data-video-section="politics"
data-canonical-url="https://www.cnn.com/videos/politics/2024/06/13/marjorie-taylor-greene-donald-trump-capitol-visit-speaker-johnson-digvid.cnn"
data-branding-key=""
data-video-slug="marjorie taylor greene donald trump capitol visit speaker johnson digvid"
data-first-publish-slug="marjorie taylor greene donald trump capitol visit speaker johnson digvid"
data-video-tags=""
data-details="">
Video Ad Feedback
MTG says Trump told her to 'be nice' to Speaker Johnson
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2024-06-03T18:00:41Z"
data-video-section="politics"
data-canonical-url="https://www.cnn.com/videos/politics/2024/06/03/fauci-death-threats-covid-origins-hearing-sot-dle-digvid.cnn"
data-branding-key=""
data-video-slug="fauci death threats covid origins hearing sot dle digvid"
data-first-publish-slug="fauci death threats covid origins hearing sot dle digvid"
data-video-tags=""
data-details="">
Video Ad Feedback
Fauci gets emotional discussing threats made against his family
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2024-06-01T16:40:38Z"
data-video-section="politics"
data-canonical-url="https://www.cnn.com/videos/politics/2024/06/01/smr-charlamagne-tha-god-on-black-voters-digvid.cnn"
data-branding-key=""
data-video-slug="SMR Charlamagne tha God on black voters digvid"
data-first-publish-slug="SMR Charlamagne tha God on black voters digvid"
data-video-tags=""
data-details="">
Video Ad Feedback
Charlamagne tha God: America has zero protection from people like Donald Trump
Chinese hackers acquired and used National Security Agency hacking tools in 2016 and used them to carry out cyberattacks, a new report has found.
In the report, the cybersecurity company Symantec claims that a Chinese hacker group associated with Chinese government intelligence conducted a hacking campaign using a tool that at the time was only known to be the property of the NSA.
Though Symantec doesn’t name particular agencies in its report, the Chinese group in question was an arm of China’s Ministry of State Security in Guangzhou, which went dark after the US Department of Justice indicted three of its members in November 2017.
While Chinese government hackers are prolific spies around the world, they apparently only used their NSA tool sparingly.
“When they were in action, they were pretty noisy, they hit a lot of targets,” Eric Chien, a fellow at Symantec, told CNN.
“But the number of targets that we’ve been able to recover so far that used this exploit was very few. They saw it was high value and didn’t want to use it everywhere,” he said.
The findings muddy the timeline of an already strange episode in the NSA’s recent history. In 2016, a group calling itself Shadow Brokers appeared online in 2016 and began leaking the agency’s tools.
In April 2017 — after the last known incident in which the Chinese hackers used the NSA tool, but before the US indictment prompted that operation to go dark — Shadow Brokers released their most damaging set of NSA tools. That included one Windows exploit that both North Korea and Russian intelligence services used to create the two most damaging ransomware strains in history, prompting international condemnation.
But those were different variants of the NSA tools than the ones Symantec found that China was using.
It’s unclear how the tool got into Chinese hands. The NSA didn’t respond to request for comment.
“We’re in a very murky place,” John Hulquist, director of intelligence at FireEye, a company that extensively tracks Chinese hacking, told CNN.
“This report raises a lot of questions that are still unanswered.”
In response to the claims, China’s Ministry of Foreign Affairs echoed China’s common refrain when it is accused of hacking US targets. Spokesperson Geng Shuang denied the report, claiming to CNN that “those who criticize or accuse us have never produced any concrete evidence.”
Last week, the Pentagon published a report which alleged that China is using espionage to steal cutting edge technology for military purposes.
“China uses a variety of methods to acquire foreign military and dual-use technologies, including targeted foreign direct investment, cyber theft, and exploitation of private Chinese nationals’ access to these technologies, as well as harnessing its intelligence services, computer intrusions, and other illicit approaches,” the congressionally mandated Department of Defense report said.
CNN’s Steven Jiang and Ryan Browne contributed to this report.