news

China Mobile takes the initiative to attack the "Silver Fox Trojan" to ensure the security of national data

2024-08-13

한어Русский языкEnglishFrançaisIndonesianSanskrit日本語DeutschPortuguêsΕλληνικάespañolItalianoSuomalainenLatina

In recent years, with the rapid development of the Internet, big data, and artificial intelligence, the amount of network data transmission has exploded, and incidents of sensitive information theft have become common. The "2023 China Government and Enterprise Data Security Risk Analysis Report" jointly released by Qi'anxin, Tianji Youmeng and other institutions shows that in the past three years, the proportion of data leaks in all data security incidents has jumped from 41.2% to 67.5%, and the network security situation has become increasingly severe.
The Silver Fox Trojan is a remote-controlled secret-stealing Trojan that has emerged in recent years. It has been active since September 2022 and has become increasingly rampant. It conducts phishing attacks through channels such as WeChat, QQ, emails, and fake tool websites, mainly targeting key industries such as governments, universities, and enterprises and institutions. Compared with ordinary Trojans, the Silver Fox Trojan uses multiple technologies such as process injection, fileless attacks, and signature forgery to bypass security protection, remotely control the victim's computer, and steal user sensitive information. It is highly concealed and poses a serious threat to the information security of my country's enterprises, institutions, and individuals.
This "Silver Fox Remote Control Trojan Purge Operation" is carried out from three aspects:
First, multi-data source threat monitoring, the entire networksituationPerception. Implement 7*24 hours real-time monitoring of "Silver Fox" attacks on multiple nodes such as backbone networks and international exports, discover and deal with "Silver Fox" remote control attack threats within the network from a global perspective, and achieve full network coverage and clearing of the entire network.
Second,continuedTracking attack trends and latest variants,initiativePrecision StrikeRelying on technologies such as gene mapping and multimodal AI sample malicious code identification, we have fully grasped the characteristics of the "Silver Fox" attack weapons and the evolution trend of its attack methods, expanded more than 1,000 undisclosed attack clues, and timely configured monitoring and carried out early warning disposal.
Third,FormulateMulti-party collaborationContingency Plan, implement closed-loop disposal.Based on self-developed security technology capabilities such as event analysis, sample reverse engineering and attack tracing, we can remove Trojans while locating attack entry points and eliminating internal network security risks, achieving both symptomatic and fundamental solutions.
China Mobile's "Silver Fox Remote Control Trojan" has achieved remarkable results. In two months, more than 3,500 individuals and home users were found to have been attacked by the Silver Fox Trojan remote control, and more than 150 government and enterprise units were assisted in completing the detection and disposal of Trojans on computers, with the protection covering many domestic universities, government units and research institutes. Many units, including a Shandong Health and Health Bureau, a Shaanxi construction company, and an Anhui mining company, sent letters of thanks, expressing their affirmation and gratitude for the action of China Mobile Hangzhou R&D Center.
In the future, China Mobile Hangzhou R&D Center will always implement the concept of building a strong cyber power, share information and solutions through the national "joint prevention and control" mechanism, use cutting-edge technology capabilities to combat cyber risks, protect the security of national data assets, and escort the development of my country's network. (Xianning News Network)
Report/Feedback