2025 sees AI giants and the proliferation of AI labs craft agentic systems, reshaping business and society. Anthropic’s $61.5B valuation fuels the race, while AI-to-AI communication boosts their reach. DeepSeek’s efficiency shows China countering U.S. dominance with affordable AI innovation.
Cortical Labs has unveiled CL1, the world’s first commercial biological computer, integrating human neurons with silicon to create Synthetic Biological Intelligence (SBI). Offering faster learning, adaptability, and lower energy use and is set to ship by June 2025.
Late last week, an extraordinary announcement signaled a dramatic shift in U.S. cybersecurity policy: the Trump administration deprioritized Russia as a leading cyber threat. Experts fear downplaying Moscow’s aggression could expose American networks to new risks and undermine national security.
A new report by Australian researcher Lina Lau links the NSA to a cyberattack on China’s Northwestern Polytechnical University. Allegedly, NSA hackers used U.S. work schedules and American keyboards, exposing their operations.
NSA Faces Scrutiny Over Alleged Cyberattack on Chinese University
The U.S. National Security Agency (NSA) is at the center of new allegations following a detailed analysis by Australian cyber security researcher Lina Lau. Her report outlines how China traced an alleged NSA cyberattack on Northwestern Polytechnical University, a key institution for aerospace and defense research.
Lau’s findings, based on intelligence from Chinese cyber security firms and government sources, suggest that NSA hackers, operating under the alias “Amanda Ramirez,” followed a strict U.S. work schedule, inadvertently exposing operational details. The attackers reportedly used American English keyboards and mistakenly revealed internal system directories due to scripting errors.
3\ How did China attribute this attack to the NSA (APT-C-40) ?
- Over 40 unique tools were forensically uncovered with several sharing similarities to tools mentioned in Shadow Brokers leak
- Attack timestamps aligned with US working hours (9 AM–4 PM EST)
The attackers allegedly gained initial access by compromising Solaris-based servers in China’s neighboring countries using SHAVER, an automated exploitation tool targeting x86/SPARC systems with RPC services.
These servers served as proxies, masking the origin of subsequent phishing campaigns against NPU staff.
Forensic analysis revealed that TAO operators leveraged SECONDDATE, a network surveillance tool installed on border routers and firewalls, to intercept and redirect internal traffic to the NSA’s FOXACID platform.
In response, an NSA official did not deny the allegations but emphasized its role in cyber security defense, stating:
“NSA is unwavering in its commitment to equipping network defenders with timely, actionable guidance to safeguard critical infrastructure against the growing and evolving landscape of cyber threats.”
The report claims NSA operatives systematically extracted classified research, infrastructure data, and sensitive operational documents. The attack allegedly leveraged a hacking platform previously exposed by former NSA contractor Edward Snowden. Lau also noted that China had tracked similar activity dating back years, suggesting a prolonged cyber espionage effort.
Despite growing evidence, the NSA has consistently avoided direct responses regarding its alleged cyber operations. Instead, officials continue to highlight China’s cyber activities, contending that:
“China’s aim is to gain access to our critical networks to sow disruption and chaos.”
The case underscores the ongoing cyber warfare between the U.S. and China, with both nations leveraging digital espionage to gain strategic advantages. As one NSA official reaffirmed:
“It is imperative that we stay committed to providing the most up-to-date guidance and actionable intelligence to those defending our networks.”
The Accusation in Context
The CVERC, China’s equivalent to a national cyber security watchdog, has been vocal about alleged U.S. cyber operations since at least 2022, when the Northwestern Polytechnical University (NPU) incident first came to light. According to their reports, the NSA has been systematically targeting Chinese institutions—universities, government agencies, tech companies, and critical infrastructure—for years.
This bulletin highlights concerns over unauthorized access and data breaches linked to a sophisticated threat actor.
The claim of “tens of thousands” of attacks isn’t just hyperbole; it’s part of a broader narrative China has pushed to depict the U.S. as the aggressor in cyberspace, flipping the script on Washington’s frequent accusations against Chinese hackers such as APT41 or the Ministry of State Security.
The Global Times, a nationalist tabloid run by the Chinese Communist Party’s People’s Daily, has amplified these claims with detailed articles. For instance, in September 2022, it reported that the NSA’s Tailored Access Operations (TAO) unit had conducted over 10,000 cyberattacks against Chinese targets over an unspecified period, later escalating that figure to “tens of thousands” in subsequent coverage. These attacks allegedly aimed to steal sensitive data, disrupt networks, and map out China’s digital infrastructure for future exploitation.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
Late last week, an extraordinary announcement signaled a dramatic shift in U.S. cybersecurity policy: the Trump administration deprioritized Russia as a leading cyber threat. Experts fear downplaying Moscow’s aggression could expose American networks to new risks and undermine national security.
Since early 2022, the British government has tied Iran to over 20 plots threatening UK citizens, reflecting Tehran’s expanding covert tactics. These attempts—spanning assassination, kidnapping, and surveillance—mark a significant escalation on British soil.
Papua New Guinea’s Finance Ministry suffered a crippling cyberattack, halting payments and exposing security gaps. Cyber experts warned PNG’s limited IT resources could prolong recovery. The attack raises concerns over data exposure, and the broader cyber threats facing Pacific nations.
In 2024, deepfakes became a major threat, causing market disruptions and privacy concerns. The rapid growth of AI technology has made digital deception easier, stressing the urgent need for enhanced verification systems to protect against misinformation and cyberattacks.