{"id":656094,"date":"2024-02-22T10:38:22","date_gmt":"2024-02-22T09:38:22","guid":{"rendered":"https:\/\/www.hashtag.al\/?p=656094"},"modified":"2024-02-22T12:12:09","modified_gmt":"2024-02-22T11:12:09","slug":"lufta-kibernetike-si-po-i-perdor-kina-kompanite-per-operacione-nderkombetare-hakerimi","status":"publish","type":"post","link":"https:\/\/www.hashtag.al\/index.php\/2024\/02\/22\/lufta-kibernetike-si-po-i-perdor-kina-kompanite-per-operacione-nderkombetare-hakerimi\/","title":{"rendered":"\u201cLufta kibernetike\u201d, si po i p\u00ebrdor Kina kompanit\u00eb p\u00ebr operacione nd\u00ebrkomb\u00ebtare hakerimi","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-656102\" src=\"https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina.png\" alt=\"\" width=\"1461\" height=\"783\" srcset=\"https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina.png 1461w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina-300x161.png 300w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina-1024x549.png 1024w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina-768x412.png 768w\" sizes=\"auto, (max-width: 1461px) 100vw, 1461px\" \/><\/p>\n<p><span style=\"color: #000000;\">Nj\u00eb grumbull dokumentesh t\u00eb zbuluara nga nj\u00eb grup hakerash i lidhur me shtetin kinez tregon se inteligjenca dhe grupet ushtarake t\u00eb Pekinit po kryejn\u00eb nd\u00ebrhyrje n\u00eb shkall\u00eb t\u00eb gjer\u00eb, sistematike kibernetike kund\u00ebr qeverive, kompanive dhe infrastruktur\u00ebs s\u00eb huaj, duke shfryt\u00ebzuar ato q\u00eb haker\u00ebt pretendojn\u00eb se jan\u00eb dob\u00ebsi n\u00eb sistemet e programeve nga kompanit\u00eb, p\u00ebrfshir\u00eb Microsoft, Apple dhe Google.<\/span><\/p>\n<p><span style=\"color: #000000;\">Baza et\u00eb dh\u00ebnave, q\u00eb p\u00ebrmban m\u00eb shum\u00eb se 570 dosje, pamje dhe regjistra t\u00eb bisedave, ofron nj\u00eb pamje t\u00eb papar\u00eb brenda operacioneve t\u00eb nj\u00eb prej firmave q\u00eb agjencit\u00eb qeveritare kineze pun\u00ebsojn\u00eb p\u00ebr operacione t\u00eb mbledhjes s\u00eb madhe t\u00eb t\u00eb dh\u00ebnave sipas k\u00ebrkes\u00ebs.<\/span><\/p>\n<p><span style=\"color: #000000;\">Dosjet, t\u00eb postuara n\u00eb GitHub jav\u00ebn e kaluar dhe t\u00eb konsideruara t\u00eb besueshme nga ekspert\u00ebt e siguris\u00eb kibernetike, megjith\u00ebse burimi mbetet i panjohur, japin holl\u00ebsi mbi kontratat p\u00ebr nxjerrjen e t\u00eb dh\u00ebnave t\u00eb huaja gjat\u00eb tet\u00eb viteve dhe p\u00ebrshkruajn\u00eb objektivat brenda t\u00eb pakt\u00ebn 20 qeverive dhe territoreve t\u00eb huaja, p\u00ebrfshir\u00eb Indin\u00eb, Hong Kongun, Tajland\u00ebn, Koren\u00eb e Jugut, Mbret\u00ebrin\u00eb e Bashkuar, Tajvanin dhe Malajzin\u00eb. Media indiane BNN raportoi m\u00eb her\u00ebt mbi dokumentet.<\/span><\/p>\n<p><span style=\"color: #000000;\"><em>\u201cRrall\u00ebher\u00eb kemi nj\u00eb qasje kaq t\u00eb pakufizuar n\u00eb funksionimin e brendsh\u00ebm t\u00eb ndonj\u00eb operacioni t\u00eb inteligjenc\u00ebs,\u201d<\/em> tha John Hultquist, kryeanalist i Mandiant Intelligence, nj\u00eb firm\u00eb e siguris\u00eb kibernetike n\u00eb pron\u00ebsi t\u00eb Google Cloud.<\/span><\/p>\n<p><span style=\"color: #000000;\"><em>&#8220;Ne kemi \u00e7do arsye p\u00ebr t\u00eb besuar se k\u00ebto jan\u00eb t\u00eb dh\u00ebnat e sakta t\u00eb nj\u00eb kontraktori q\u00eb mb\u00ebshtet operacionet globale dhe vendase t\u00eb spiunazhit kibernetik jasht\u00eb Kin\u00ebs,&#8221;<\/em> tha ai.<\/span><\/p>\n<p><span style=\"color: #000000;\">Zyrtar\u00ebt e inteligjenc\u00ebs amerikane e shohin Kin\u00ebn si k\u00ebrc\u00ebnimin m\u00eb t\u00eb madh afatgjat\u00eb p\u00ebr sigurin\u00eb amerikane dhe kan\u00eb ngritur alarmin p\u00ebr fushatat e saj t\u00eb hakerimit.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-656103\" src=\"https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina2.png\" alt=\"\" width=\"795\" height=\"467\" srcset=\"https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina2.png 795w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina2-300x176.png 300w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina2-768x451.png 768w\" sizes=\"auto, (max-width: 795px) 100vw, 795px\" \/><\/p>\n<p><span style=\"color: #000000;\">Ekspert\u00ebt po shqyrtojn\u00eb dokumentet, t\u00eb cilat ofrojn\u00eb nj\u00eb v\u00ebshtrim t\u00eb pazakont\u00eb brenda konkurrenc\u00ebs s\u00eb fort\u00eb t\u00eb industris\u00eb s\u00eb mbledhjes s\u00eb t\u00eb dh\u00ebnave t\u00eb siguris\u00eb komb\u00ebtare t\u00eb Kin\u00ebs, ku grupet konkurruese kalojn\u00eb p\u00ebr kontrata fitimprur\u00ebse qeveritare duke u zotuar p\u00ebr qasje gjithnj\u00eb e m\u00eb shkat\u00ebrruese dhe gjith\u00ebp\u00ebrfshir\u00ebse n\u00eb informacione t\u00eb ndjeshme q\u00eb konsiderohen t\u00eb dobishme nga policia dhe ushtria kineze dhe agjencit\u00eb e inteligjenc\u00ebs.<\/span><\/p>\n<p><span style=\"color: #000000;\">Dokumentet vijn\u00eb nga iSoon, e njohur gjithashtu si Auxun, nj\u00eb firm\u00eb kineze me seli n\u00eb Shangai q\u00eb shet sh\u00ebrbime hakerimi dhe grumbullimi t\u00eb t\u00eb dh\u00ebnave nga pal\u00ebt e treta p\u00ebr zyrat e qeveris\u00eb kineze, grupet e siguris\u00eb dhe nd\u00ebrmarrjet shtet\u00ebrore.<\/span><\/p>\n<p><span style=\"color: #000000;\">Kutia (cache) nuk p\u00ebrfshin t\u00eb dh\u00ebna t\u00eb nxjerra nga operacionet e haker\u00ebve kinez\u00eb, por rendit objektivat dhe &#8211; n\u00eb shum\u00eb raste &#8211; p\u00ebrmbledhjet e sasive t\u00eb t\u00eb dh\u00ebnave t\u00eb mostr\u00ebs s\u00eb nxjerr\u00eb dhe holl\u00ebsi n\u00ebse haker\u00ebt mor\u00ebn kontroll t\u00eb plot\u00eb ose t\u00eb pjessh\u00ebm t\u00eb sistemeve t\u00eb huaja.<\/span><\/p>\n<p><span style=\"color: #000000;\">Nj\u00eb dokument renditi 80 objektiva jasht\u00eb shtetit q\u00eb haker\u00ebt iSoon duket se i kishin shkelur me sukses. T\u00eb dh\u00ebnat p\u00ebrfshinin 95.2 gigabajt t\u00eb dh\u00ebna mbi emigracionin nga India dhe nj\u00eb koleksion prej 3 terabajt\u00ebsh t\u00eb regjistrave t\u00eb telefonatave nga ofruesi i telekomit \u2018LG U Plus\u2019 i Kores\u00eb s\u00eb Jugut. <\/span><\/p>\n<p><span style=\"color: #000000;\">Grupi synoi gjithashtu firma t\u00eb tjera t\u00eb telekomunikacionit n\u00eb Hong Kong, Kazakistan, Malajzi, Mongoli, Nepal dhe Tajvan. Ambasada indiane n\u00eb Uashington nuk iu p\u00ebrgjigj nj\u00eb k\u00ebrkese p\u00ebr koment mbi dokumentet.<\/span><\/p>\n<p><span style=\"color: #000000;\">Klient\u00ebt e ISoon gjithashtu k\u00ebrkuan ose mor\u00ebn t\u00eb dh\u00ebna t\u00eb infrastruktur\u00ebs, sipas dokumenteve t\u00eb rrjedhura. Tabela tregoi se firma kishte nj\u00eb most\u00ebr prej 459 GB t\u00eb dh\u00ebnash t\u00eb hart\u00ebs rrugore nga Tajvani, ishulli prej 23 milion\u00eb banor\u00ebsh q\u00eb Kina e k\u00ebrkon si territorin e saj.<\/span><\/p>\n<p><span style=\"color: #000000;\">T\u00eb dh\u00ebnat e rrug\u00ebve mund t\u00eb jen\u00eb t\u00eb dobishme p\u00ebr ushtrin\u00eb kineze n\u00eb rast t\u00eb nj\u00eb pushtimi t\u00eb Tajvanit, than\u00eb analist\u00ebt.<\/span><\/p>\n<p><span style=\"color: #000000;\"><em>&#8220;T\u00eb kuptuarit e terrenit t\u00eb autostrad\u00ebs dhe vendndodhjes s\u00eb urave dhe tuneleve \u00ebsht\u00eb thelb\u00ebsore, n\u00eb m\u00ebnyr\u00eb q\u00eb t\u00eb mund t\u00eb l\u00ebvizni forcat e blinduara dhe k\u00ebmb\u00ebsorin\u00eb rreth ishullit n\u00eb nj\u00eb p\u00ebrpjekje p\u00ebr t\u00eb pushtuar Tajvanin,&#8221;<\/em> tha Dmitri Alperovitch, nj\u00eb ekspert i siguris\u00eb komb\u00ebtare dhe kryetar i \u2018Silverado Policy Accelerator\u2019, nj\u00eb institut k\u00ebrkimi.<\/span><\/p>\n<p><span style=\"color: #000000;\">Nd\u00ebr objektivat e tjer\u00eb ishin 10 agjenci qeveritare tajlandeze, duke p\u00ebrfshir\u00eb Ministrin\u00eb e Jashtme t\u00eb vendit, agjencin\u00eb e inteligjenc\u00ebs dhe Senatin. Tabela v\u00ebren se iSoon mban t\u00eb dh\u00ebna mostra t\u00eb nxjerra nga ato agjenci nga viti 2020 deri n\u00eb vitin 2022. Ambasada e Tajland\u00ebs n\u00eb Uashington nuk iu p\u00ebrgjigj nj\u00eb k\u00ebrkese p\u00ebr koment.<\/span><\/p>\n<p><span style=\"color: #000000;\">Shumica e objektivave ishin n\u00eb Azi, megjith\u00ebse iSoon mori k\u00ebrkesa p\u00ebr hakerime m\u00eb larg. Regjistrat e bisedave t\u00eb p\u00ebrfshira n\u00eb rrjedhje p\u00ebrshkruajn\u00eb shitjen e t\u00eb dh\u00ebnave t\u00eb paspecifikuara n\u00eb lidhje me NATO-n n\u00eb vitin 2022. <\/span><\/p>\n<p><span style=\"color: #000000;\">Nuk \u00ebsht\u00eb e qart\u00eb n\u00ebse t\u00eb dh\u00ebnat jan\u00eb mbledhur nga burime t\u00eb disponueshme publikisht apo jan\u00eb nxjerr\u00eb n\u00eb nj\u00eb hakerim. NATO nuk iu p\u00ebrgjigj menj\u00ebher\u00eb nj\u00eb k\u00ebrkese p\u00ebr koment.<\/span><\/p>\n<p><span style=\"color: #000000;\">Nj\u00eb dosje tjet\u00ebr tregon punonj\u00ebsit q\u00eb diskutojn\u00eb nj\u00eb list\u00eb objektivash n\u00eb Britani, duke p\u00ebrfshir\u00eb Ministrit\u00eb e Brendshme dhe t\u00eb Jashtme, si dhe Thesarin. Gjithashtu n\u00eb list\u00eb ishin organizatat \u2018Chatham House\u2019 dhe \u2018Instituti Nd\u00ebrkomb\u00ebtar p\u00ebr Studime Strategjike\u2019.<\/span><\/p>\n<p><span style=\"color: #000000;\"><em>&#8220;N\u00eb klim\u00ebn e tanishme, ne, s\u00eb bashku me shum\u00eb organizata t\u00eb tjera, jemi objektiv i p\u00ebrpjekjeve t\u00eb rregullta t\u00eb sulmeve nga aktor\u00ebt shtet\u00ebror\u00eb dhe joshtet\u00ebror\u00eb,&#8221;<\/em> tha nj\u00eb z\u00ebdh\u00ebn\u00ebs i \u2018Chatham House\u2019, i cili tha se grupi \u00ebsht\u00eb &#8220;natyrsh\u00ebm i shqet\u00ebsuar&#8221; p\u00ebr rrjedhjet, por ka masa mbrojt\u00ebse.<\/span><\/p>\n<p><span style=\"color: #000000;\">E pyetur p\u00ebr dokumentet e zbuluara, Ministria e Jashtme e Mbret\u00ebris\u00eb s\u00eb Bashkuar nuk pranoi t\u00eb komentoj\u00eb.<\/span><\/p>\n<p><span style=\"color: #000000;\">Haker\u00ebt gjithashtu leht\u00ebsuan p\u00ebrpjekjet p\u00ebr t\u00eb nxjerr\u00eb informacion nga partner\u00eb t\u00eb ngusht\u00eb diplomatik\u00eb, p\u00ebrfshir\u00eb Pakistanin dhe Kamboxhian.<\/span><\/p>\n<div id=\"attachment_656104\" style=\"width: 1450px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-656104\" class=\"size-full wp-image-656104\" src=\"https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/imrs-ezgif.com-webp-to-jpg-converter.jpg\" alt=\"\" width=\"1440\" height=\"960\" srcset=\"https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/imrs-ezgif.com-webp-to-jpg-converter.jpg 1440w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/imrs-ezgif.com-webp-to-jpg-converter-300x200.jpg 300w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/imrs-ezgif.com-webp-to-jpg-converter-1024x683.jpg 1024w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/imrs-ezgif.com-webp-to-jpg-converter-768x512.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><p id=\"caption-attachment-656104\" class=\"wp-caption-text\"><em><span style=\"color: #0000ff;\">Nd\u00ebrtesa iSoon n\u00eb provinc\u00ebn Sichuan t\u00eb Kin\u00ebs jugper\u00ebndimore<\/span><\/em><\/p><\/div>\n<p><span style=\"color: #000000;\"><strong>Kina nxit konkurrenc\u00ebn e haker\u00ebve<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">ISoon \u00ebsht\u00eb pjes\u00eb e nj\u00eb ekosistemi kontraktor\u00ebsh q\u00eb doli nga nj\u00eb sken\u00eb hakerimi &#8220;patriotike&#8221; e krijuar m\u00eb shum\u00eb se dy dekada m\u00eb par\u00eb dhe tani punon p\u00ebr nj\u00eb s\u00ebr\u00eb nj\u00ebsish t\u00eb fuqishme qeveritare, duke p\u00ebrfshir\u00eb Ministrin\u00eb e Siguris\u00eb Publike, Ministrin\u00eb e Siguris\u00eb s\u00eb Shtetit dhe ushtrin\u00eb kineze.<\/span><\/p>\n<p><span style=\"color: #000000;\">Sipas zyrtar\u00ebve amerikan\u00eb, haker\u00ebt me Ushtrin\u00eb \u00c7lirimtare Popullore kan\u00eb shkelur sistemet kompjuterike n\u00eb rreth 22 entitete ky\u00e7e t\u00eb infrastruktur\u00ebs amerikane gjat\u00eb vitit t\u00eb kaluar n\u00eb nj\u00eb p\u00ebrpjekje p\u00ebr t\u00eb krijuar nj\u00eb terren dhe p\u00ebr t\u00eb qen\u00eb n\u00eb gjendje t\u00eb nxjerrin jasht\u00eb funksionit sh\u00ebrbimet e energjis\u00eb dhe ujit si dhe sistemin e komunikimit dhe transportit.<\/span><\/p>\n<p><span style=\"color: #000000;\">Modeli i Kin\u00ebs i p\u00ebrzierjes s\u00eb mb\u00ebshtetjes shtet\u00ebrore me nj\u00eb nxitje fitimi ka krijuar nj\u00eb rrjet t\u00eb madh aktor\u00ebsh q\u00eb konkurrojn\u00eb p\u00ebr t\u00eb shfryt\u00ebzuar dob\u00ebsit\u00eb dhe p\u00ebr t\u00eb rritur biznesin e tyre. Shkalla dhe k\u00ebmb\u00ebngulja e sulmeve t\u00eb tyre jan\u00eb \u2018dhimbje koke\u2019 p\u00ebr gjigant\u00ebt amerikan\u00eb t\u00eb teknologjis\u00eb si X, Microsoft dhe Apple, t\u00eb cil\u00ebt tani jan\u00eb t\u00eb ky\u00e7ur n\u00eb nj\u00eb gar\u00eb t\u00eb vijueshme p\u00ebr t\u00eb mposhtur haker\u00ebt.<\/span><\/p>\n<p><span style=\"color: #000000;\">T\u00eb gjitha prodhimet softuerike kan\u00eb dob\u00ebsi dhe nj\u00eb treg i fuqish\u00ebm global shp\u00ebrblen ata q\u00eb gjejn\u00eb dob\u00ebsi sigurie ose zhvillojn\u00eb mjete t\u00eb njohura si shfryt\u00ebzime p\u00ebr t\u00eb p\u00ebrfituar prej tyre.<\/span><\/p>\n<p><span style=\"color: #000000;\"> Shum\u00eb shit\u00ebs softuer\u00ebsh ofrojn\u00eb dhurata p\u00ebr t\u00eb shp\u00ebrblyer studiuesit q\u00eb raportojn\u00eb t\u00eb metat e siguris\u00eb, por kontraktor\u00ebt qeveritar\u00eb n\u00eb Shtetet e Bashkuara dhe gjetk\u00eb shpesh \u00a0p\u00ebrdorin k\u00ebto shfryt\u00ebzime &#8211; duke paguar m\u00eb shum\u00eb p\u00ebr t\u00eb drejt\u00ebn p\u00ebr t&#8217;i p\u00ebrdorur ato n\u00eb spiunazh ose aktivitet fyes.<\/span><\/p>\n<p><span style=\"color: #000000;\">Kontraktor\u00ebt e mbrojtjes dhe inteligjenc\u00ebs amerikane zhvillojn\u00eb gjithashtu mjete p\u00ebr t\u00eb hyr\u00eb n\u00eb softuer, t\u00eb cil\u00ebt m\u00eb pas p\u00ebrdoren nga zyrtar\u00ebt federal\u00eb n\u00eb operacionet e v\u00ebzhgimit dhe spiunazhit, ose n\u00eb arm\u00ebt sulmuese kibernetike.<\/span><\/p>\n<p><span style=\"color: #000000;\">Studiuesit kinez\u00eb t\u00eb siguris\u00eb n\u00eb kompanit\u00eb private jan\u00eb p\u00ebrmir\u00ebsuar duksh\u00ebm vitet e fundit, duke fituar nj\u00eb num\u00ebr m\u00eb t\u00eb madh konkursesh nd\u00ebrkomb\u00ebtare t\u00eb haker\u00ebve, si dhe duke mbledhur m\u00eb shum\u00eb shp\u00ebrblime nga kompanit\u00eb e teknologjis\u00eb.<\/span><\/p>\n<p><span style=\"color: #000000;\">Por skedar\u00ebt iSoon p\u00ebrmbajn\u00eb ankesa nga punonj\u00ebs t\u00eb pak\u00ebnaqur p\u00ebr pag\u00ebn dhe ngarkes\u00ebn e pun\u00ebs. Shum\u00eb haker\u00eb punojn\u00eb p\u00ebr m\u00eb pak se 1000 dollar\u00eb n\u00eb muaj, pag\u00eb \u00e7udit\u00ebrisht e ul\u00ebt edhe n\u00eb Kin\u00eb, tha Adam Kozy, nj\u00eb ish-analist i FBI-s\u00eb q\u00eb po shkruan nj\u00eb lib\u00ebr mbi hakerimin kinez.<\/span><\/p>\n<p><span style=\"color: #000000;\">Rrjedhjet l\u00ebn\u00eb t\u00eb kuptohet p\u00ebr grindje dhe pak\u00ebnaq\u00ebsi n\u00eb rrjetin e haker\u00ebve patriot\u00eb kinez\u00eb, pavar\u00ebsisht bashk\u00ebpunimit t\u00eb gjat\u00eb midis grupeve.<\/span><\/p>\n<p><span style=\"color: #000000;\">Edhe pse \u00ebsht\u00eb e paqart\u00eb se kush i publikoi dokumentet dhe pse, ekspert\u00ebt e siguris\u00eb kibernetike than\u00eb se mund t\u00eb jet\u00eb nj\u00eb ish-punonj\u00ebs i pak\u00ebnaqur apo edhe nj\u00eb hakmarrje nga nj\u00eb grup konkurrent.<\/span><\/p>\n<p><span style=\"color: #000000;\">Njoftuesi u paraqit n\u00eb GitHub si nj\u00eb sinjalizues q\u00eb ekspozon keqp\u00ebrdorimin, kushtet e k\u00ebqija t\u00eb pun\u00ebs dhe prodhime t\u00eb &#8220;cil\u00ebsis\u00eb s\u00eb ul\u00ebt&#8221; q\u00eb iSoon po p\u00ebrdor p\u00ebr t\u00eb &#8220;mashtruar&#8221; klient\u00ebt e saj t\u00eb qeveris\u00eb. N\u00eb bisedat e sh\u00ebnuara si ankesa t\u00eb pun\u00ebtor\u00ebve, punonj\u00ebsit ankoheshin p\u00ebr seksizmin, or\u00ebt e gjata dhe shitjet e dob\u00ebta.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Haker\u00eb me qira<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">Brenda Kin\u00ebs, k\u00ebto grupe paraqiten si thelb\u00ebsore p\u00ebr fushat\u00ebn e gjer\u00eb t\u00eb Partis\u00eb Komuniste p\u00ebr t\u00eb eliminuar k\u00ebrc\u00ebnimet ndaj sundimit t\u00eb saj nga hap\u00ebsira kibernetike. Kina vitet e fundit ka p\u00ebrshkall\u00ebzuar p\u00ebrpjekjet e saj p\u00ebr t\u00eb kapur mediat sociale publike nd\u00ebrkomb\u00ebtare dhe p\u00ebr t\u00eb gjurmuar objektivat jasht\u00eb vendit, megjith\u00ebse kryq\u00ebzimi midis mbik\u00ebqyrjes s\u00eb madhe publik dhe hakerimit privat shpesh \u00ebsht\u00eb i paqart\u00eb.<\/span><\/p>\n<p><span style=\"color: #000000;\">ISoon ka n\u00ebnshkruar qindra marr\u00ebveshje me policin\u00eb kineze q\u00eb shkojn\u00eb nga pun\u00eb t\u00eb vogla me \u00e7mim 1,400 dollar\u00eb deri n\u00eb kontrata shum\u00ebvje\u00e7are q\u00eb kushtojn\u00eb deri n\u00eb 800,000 dollar\u00eb, tregoi nj\u00eb tabel\u00eb.<\/span><\/p>\n<p><span style=\"color: #000000;\">Manual\u00ebt e produkteve t\u00eb rrjedhura t\u00eb kompanis\u00eb p\u00ebrshkruajn\u00eb sh\u00ebrbimet q\u00eb ato ofrojn\u00eb dhe \u00e7mimet e tyre dhe mburren se jan\u00eb n\u00eb gjendje t\u00eb vjedhin t\u00eb dh\u00ebna pa u zbuluar. <\/span><\/p>\n<p><span style=\"color: #000000;\">P\u00ebrshkrimet e produkteve, t\u00eb synuara p\u00ebr klientel\u00ebn e siguris\u00eb s\u00eb shtetit, ndonj\u00ebher\u00eb p\u00ebrdorin gjuh\u00ebn e koh\u00ebs s\u00eb luft\u00ebs p\u00ebr t\u00eb p\u00ebrshkruar nj\u00eb mision t\u00eb nxjerrjes s\u00eb t\u00eb dh\u00ebnave t\u00eb mb\u00ebshtetur nga k\u00ebrc\u00ebnime e skajshme ndaj siguris\u00eb komb\u00ebtare t\u00eb Kin\u00ebs.<\/span><\/p>\n<p><span style=\"color: #000000;\"><em>\u201cInformacioni \u00ebsht\u00eb b\u00ebr\u00eb gjithnj\u00eb e m\u00eb shum\u00eb burimi i jet\u00ebs s\u00eb nj\u00eb vendi dhe nj\u00eb nga burimet q\u00eb vendet po p\u00ebrpiqen t\u00eb kapin. N\u00eb luft\u00ebn e informacionit, vjedhja e informacionit t\u00eb armikut dhe shkat\u00ebrrimi i sistemeve t\u00eb informacionit t\u00eb armikut jan\u00eb b\u00ebr\u00eb \u00e7el\u00ebsi p\u00ebr mposhtjen e armikut,&#8221;<\/em> thuhet n\u00eb nj\u00eb dokument q\u00eb p\u00ebrshkruan nj\u00eb paket\u00eb iSoon p\u00ebr shitje, sipas tij, do t&#8217;i lejonte klient\u00ebt t\u00eb hynin dhe t\u00eb kontrollonin n\u00eb m\u00ebnyr\u00eb t\u00eb fsheht\u00eb llogarit\u00eb e Microsoft Outlook dhe Hotmail duke anashkaluar protokollet e siguris\u00eb.<\/span><\/p>\n<p><span style=\"color: #000000;\">Manual\u00ebt e produktit t\u00eb ISoon reklamojn\u00eb gjithashtu nj\u00eb sh\u00ebrbim prej 25,000 dollar\u00ebsh p\u00ebr nj\u00eb sistem kontrolli t\u00eb &#8220;qasjes n\u00eb larg\u00ebsi&#8221; p\u00ebr t\u00eb marr\u00eb t\u00eb dh\u00ebnat e telefonave \u2018t\u00eb zgjuar\u2019 Apple iOS nga nj\u00eb objektiv, duke p\u00ebrfshir\u00eb &#8220;informacionet baz\u00eb t\u00eb telefonit celular, pozicionimin GPS, kontaktet e telefonit celular&#8221; dhe &#8220;regjistrimin e mjedisit&#8221;.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-656105\" src=\"https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina3.png\" alt=\"\" width=\"770\" height=\"451\" srcset=\"https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina3.png 770w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina3-300x176.png 300w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina3-768x450.png 768w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina3-250x145.png 250w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/p>\n<p><span style=\"color: #000000;\">Nj\u00eb nivel reklamoi nj\u00eb sh\u00ebrbim n\u00eb t\u00eb cilin iSoon mund t\u00eb kryente me efikasitet fushata \u2018mashtrimi\u2019 kund\u00ebr individ\u00ebve ose grupeve t\u00eb p\u00ebrdoruesve t\u00eb Twitter. Nj\u00eb tjet\u00ebr sh\u00ebrbim i p\u00ebrshkruar, do t&#8217;i lejonte firm\u00ebs t\u00eb kontrollonte nga larg\u00ebsia sistemet operative t\u00eb synuara Windows dhe Mac.<\/span><\/p>\n<p><span style=\"color: #000000;\">Apple, Microsoft dhe X, dikur Twitter, nuk iu p\u00ebrgjigj\u00ebn k\u00ebrkesave p\u00ebr koment.<\/span><\/p>\n<p><span style=\"color: #000000;\">Google tha se dokumentet nuk listonin dob\u00ebsi specifike n\u00eb softuerin e saj. Nj\u00eb z\u00ebdh\u00ebn\u00ebs tha se hakerat ndoshta po p\u00ebrpiqeshin t\u00eb merrnin objektiva p\u00ebr t\u00eb instaluar softuer me q\u00ebllim t\u00eb keq, i cili m\u00eb pas mund t\u00eb punonte i pazbuluar.<\/span><\/p>\n<p><span style=\"color: #000000;\">P\u00ebrve\u00e7 arritjes s\u00eb marr\u00ebveshjeve afatgjata, iSoon punonte rregullisht sipas k\u00ebrkes\u00ebs, n\u00eb p\u00ebrgjigje t\u00eb k\u00ebrkesave nga policia n\u00eb qytetet m\u00eb t\u00eb vogla kineze dhe me kompani private, sipas faqeve t\u00eb regjistrave t\u00eb bisedave midis drejtuesve m\u00eb t\u00eb lart\u00eb t\u00eb kompanis\u00eb.<\/span><\/p>\n<p><span style=\"color: #000000;\">Ndonj\u00ebher\u00eb klient\u00ebt e dinin sakt\u00ebsisht se \u00e7far\u00eb donin &#8211; p\u00ebr shembull, t\u00eb gjenin identitetin e nj\u00eb p\u00ebrdoruesi specifik t\u00eb T\u00ebitter-it &#8211; por ata gjithashtu shpesh b\u00ebnin k\u00ebrkesa t\u00eb hapura. <\/span><\/p>\n<p><span style=\"color: #000000;\">N\u00eb nj\u00eb shk\u00ebmbim, punonj\u00ebsit diskutuan nj\u00eb k\u00ebrkes\u00eb nga nj\u00eb zyr\u00eb shtet\u00ebrore e siguris\u00eb n\u00eb Kin\u00ebn jugore, duke pyetur n\u00ebse iSoon kishte shum\u00eb p\u00ebr t\u00eb ofruar n\u00eb Hong Kongun aty pran\u00eb. N\u00eb vend t\u00eb k\u00ebsaj, nj\u00eb punonj\u00ebs i iSoon sugjeroi emaile nga Malajzia.<\/span><\/p>\n<p><span style=\"color: #000000;\">Qasja e shp\u00ebrndarjes u shfaq pjes\u00ebrisht e motivuar nga presioni i klient\u00ebve p\u00ebr t\u00eb ofruar m\u00eb shum\u00eb informacion dhe cil\u00ebsi m\u00eb t\u00eb lart\u00eb. Por pavar\u00ebsisht se kompania mburret me aft\u00ebsit\u00eb m\u00eb t\u00eb p\u00ebrparuara, bisedat tregojn\u00eb se klient\u00ebt rregullisht nuk ishin t\u00eb impresionuar me informacionin e hakuar.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-656106\" src=\"https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina4.png\" alt=\"\" width=\"935\" height=\"486\" srcset=\"https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina4.png 935w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina4-300x156.png 300w, https:\/\/www.hashtag.al\/wp-content\/uploads\/2024\/02\/kina4-768x399.png 768w\" sizes=\"auto, (max-width: 935px) 100vw, 935px\" \/><\/p>\n<p><span style=\"color: #000000;\">ISoon d\u00ebshtoi n\u00eb m\u00ebnyr\u00eb t\u00eb p\u00ebrs\u00ebritur t\u00eb nxjerr\u00eb t\u00eb dh\u00ebna nga agjencit\u00eb qeveritare, treguan diskutimet e brendshme, me disa autoritete lokale q\u00eb ankoheshin p\u00ebr inteligjenc\u00ebn n\u00ebn nivelin e pritur.<\/span><\/p>\n<p><span style=\"color: #000000;\">Megjith\u00ebse disa nga sh\u00ebrbimet e iSoon p\u00ebrqendroheshin n\u00eb k\u00ebrc\u00ebnimet e brendshme, kompania shpesh theksoi aft\u00ebsin\u00eb e saj p\u00ebr t\u00eb synuar objektiva jasht\u00eb shtetit n\u00eb rajon &#8211; duke p\u00ebrfshir\u00eb departamentet qeveritare n\u00eb Indi dhe Nepal, si dhe n\u00eb organizatat tibetiane jasht\u00eb shtetit &#8211; p\u00ebr t\u00eb t\u00ebrhequr klient\u00eb. <\/span><\/p>\n<p><span style=\"color: #000000;\">N\u00eb dhjetor 2021, grupi pretendoi se kishte fituar qasje n\u00eb intranetin e qeveris\u00eb tibetiane n\u00eb m\u00ebrgim, duke nisur nj\u00eb k\u00ebrkim t\u00eb furish\u00ebm p\u00ebr nj\u00eb bler\u00ebs. Rreth 37 minuta m\u00eb von\u00eb, kompania kishte gjetur nj\u00eb klient t\u00eb interesuar.<\/span><\/p>\n<p><span style=\"color: #000000;\">Nj\u00eb produkt tjet\u00ebr, me \u00e7mim 55,600 dollar\u00eb p\u00ebr paket\u00eb, ka p\u00ebr q\u00ebllim t\u00eb lejoj\u00eb kontrollin dhe menaxhimin e diskutimit n\u00eb Twitter, duke p\u00ebrfshir\u00eb p\u00ebrdorimin e lidhjeve \u2018phishing\u2019 p\u00ebr t\u00eb hyr\u00eb dhe marr\u00eb p\u00ebrsip\u00ebr llogarit\u00eb e synuara.<\/span><\/p>\n<p><span style=\"color: #000000;\"> ISoon pretendon se sistemi m\u00eb pas i lejon klient\u00ebt t\u00eb gjejn\u00eb dhe t&#8217;u p\u00ebrgjigjen \u201cmendimeve t\u00eb paligjshme&#8221; dhe &#8220;reaguese&#8221; duke p\u00ebrdorur llogari q\u00eb kontrollohen n\u00eb m\u00ebnyr\u00eb qendrore nga klienti p\u00ebr t\u00eb &#8220;manipuluar diskutimin&#8221;.<\/span><\/p>\n<p><span style=\"color: #000000;\">Dokumentet tregojn\u00eb se iSoon u takua dhe punoi me an\u00ebtar\u00ebt e APT41, nj\u00eb grup haker\u00ebsh kinez q\u00eb u akuzua nga Departamenti i Drejt\u00ebsis\u00eb i SHBA n\u00eb 2020 p\u00ebr sh\u00ebnjestrimin e m\u00eb shum\u00eb se 100 firmave t\u00eb loj\u00ebrave video, universiteteve dhe viktimave t\u00eb tjera n\u00eb mbar\u00eb bot\u00ebn.<\/span><\/p>\n<p><span style=\"color: #000000;\">M\u00eb pas, themeluesi dhe kreu i iSoon, Wu Haibo, i cili quhet ndryshe &#8220;shutd0\u00ebn&#8221;, b\u00ebri shaka me nj\u00eb tjet\u00ebr ekzekutiv p\u00ebr t\u00eb shkuar p\u00ebr t\u00eb pir\u00eb &#8220;41&#8221; me Chengdu 404 &#8211; organizata APT41 n\u00eb t\u00eb cil\u00ebn b\u00ebn pjes\u00eb, p\u00ebr t\u00eb festuar tashm\u00eb q\u00eb jan\u00eb duke u \u201cverifikuar nga Byroja Federale e Hetimit.\u201d<\/span><\/p>\n<p><span style=\"color: #000000;\">Por mesazhet e bisedave midis drejtuesve nga viti 2022 sugjerojn\u00eb se marr\u00ebdh\u00ebniet midis grupeve ishin acaruar sepse iSoon ishte von\u00eb n\u00eb pages\u00ebn e Chengdu 404 t\u00eb nj\u00eb shume mbi 1 milion juan\u00eb (140,000 dollar\u00eb). Chengdu 404 m\u00eb von\u00eb paditi iSoon n\u00eb nj\u00eb mosmarr\u00ebveshje mbi nj\u00eb kontrat\u00eb p\u00ebr zhvillimin e softuerit.<\/span><\/p>\n<p><span style=\"color: #000000;\">Wu dhe ekipi i tij u shfaq\u00ebn indiferent\u00eb p\u00ebr iden\u00eb se nj\u00eb dit\u00eb do akuzoheshin nga autoritetet amerikane si APT41. N\u00eb korrik 2022, nj\u00eb ekzekutiv pyeti Wu-n\u00eb n\u00ebse kompania po v\u00ebzhgohej nga af\u00ebr nga Shtetet e Bashkuara.<\/span><\/p>\n<p><span style=\"color: #000000;\"><em>&#8220;Nuk shqet\u00ebsohem p\u00ebr k\u00ebt\u00eb,&#8221;<\/em> u p\u00ebrgjigj Wu.<\/span><\/p>\n<p><span style=\"color: #000000;\"><em>&#8220;Kjo ishte nj\u00eb \u00e7\u00ebshtje q\u00eb do ndodh\u00eb her\u00ebt a von\u00eb gjithsesi.&#8221;<\/em><\/span><\/p>\n<p><span style=\"color: #000000;\">As iSoon dhe as Wu nuk iu p\u00ebrgjigj\u00ebn k\u00ebrkesave t\u00eb d\u00ebrguara me email p\u00ebr koment.<\/span><\/p>\n<p><span style=\"color: #000000;\"><span style=\"color: #ff0000;\"><strong>VINI RE<\/strong><\/span>: Ky material \u00ebsht\u00eb pron\u00ebs intelektuale e <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.washingtonpost.com\/world\/2024\/02\/21\/china-hacking-leak-documents-isoon\/\">WP<\/a><\/span><\/span><\/p>\n<p><span style=\"color: #000000;\">P\u00ebrgatiti p\u00ebr <span style=\"color: #0000ff;\">Hashtag.al,<\/span> Klodian Manjani<\/span><\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"<p>Nj\u00eb grumbull dokumentesh t\u00eb zbuluara nga nj\u00eb grup hakerash i lidhur me shtetin kinez tregon se inteligjenca dhe grupet ushtarake t\u00eb Pekinit po kryejn\u00eb nd\u00ebrhyrje n\u00eb shkall\u00eb t\u00eb gjer\u00eb, sistematike kibernetike kund\u00ebr qeverive, kompanive dhe infrastruktur\u00ebs s\u00eb huaj, duke shfryt\u00ebzuar ato q\u00eb haker\u00ebt pretendojn\u00eb se jan\u00eb dob\u00ebsi n\u00eb sistemet e programeve nga kompanit\u00eb, p\u00ebrfshir\u00eb Microsoft, [&hellip;]<\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":51,"featured_media":656151,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-656094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ballina"],"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/www.hashtag.al\/index.php\/wp-json\/wp\/v2\/posts\/656094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hashtag.al\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hashtag.al\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hashtag.al\/index.php\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hashtag.al\/index.php\/wp-json\/wp\/v2\/comments?post=656094"}],"version-history":[{"count":0,"href":"https:\/\/www.hashtag.al\/index.php\/wp-json\/wp\/v2\/posts\/656094\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hashtag.al\/index.php\/wp-json\/wp\/v2\/media\/656151"}],"wp:attachment":[{"href":"https:\/\/www.hashtag.al\/index.php\/wp-json\/wp\/v2\/media?parent=656094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hashtag.al\/index.php\/wp-json\/wp\/v2\/categories?post=656094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hashtag.al\/index.php\/wp-json\/wp\/v2\/tags?post=656094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}