Chinese Spyware Code ‘Jian’ Was Copied From America's National Security Agency, Researchers Say

The researchers called Jian "kind of a copycat, a Chinese replica."

Advertisement
By Reuters | Updated: 22 February 2021 18:01 IST
Highlights
  • Checkpoint's head of research, called Jian kind of a copycat
  • In a statement, Lockheed said it routinely evaluates third-party software
  • How the Jian malware analysed by Checkpoint was used is not clear

The Chinese Embassy in Washington did not respond to requests for comment

Chinese spies used code first developed by the US National Security Agency to support their hacking operations, Israeli researchers said on Monday, another indication of how malicious software developed by governments can boomerang against their creators.

Tel Aviv-based Check Point Software Technologies issued a report noting that some features in a piece of China-linked malware it dubs "Jian" were so similar they could only have been stolen from some of the National Security Agency break-in tools leaked to the internet in 2017.

Yaniv Balmas, Checkpoint's head of research, called Jian "kind of a copycat, a Chinese replica."

Advertisement

The find comes as some experts argue that American spies should devote more energy to fixing the flaws they find in software instead of developing and deploying malicious software to exploit it.

Advertisement

The NSA declined comment. The Chinese Embassy in Washington did not respond to requests for comment.

A person familiar with the matter said Lockheed Martin – which is credited as having identified the vulnerability exploited by Jian in 2017 – discovered it on the network of an unidentified third party.

Advertisement

In a statement, Lockheed said it "routinely evaluates third-party software and technologies to identify vulnerabilities."

Countries around the world develop malware that breaks into their rivals' devices by taking advantage of flaws in the software that runs them. Every time spies discover a new flaw they must decide whether to quietly exploit it or fix the issue to thwart rivals and rogues.

Advertisement

That dilemma came to public attention between 2016 and 2017, when a mysterious group calling itself the "Shadow Brokers" published some of the NSA's most dangerous code to the Internet, allowing cybercriminals and rival nations to add American-made digital break-in tools to their own arsenals.

How the Jian malware analysed by Checkpoint was used is not clear. In an advisory published in 2017, Microsoft suggested it was linked to a Chinese entity it dubs "Zirconium," which last year was accused of targeting US election-related organizations and individuals, including people associated with President Joe Biden's campaign.

Checkpoint says Jian appears to have been crafted in 2014, at least two years before the Shadow Brokers made their public debut. That, in conjunction with research published in 2019 by Broadcom-owned cyber-security firm Symantec about a similar incident, suggests the NSA has repeatedly lost control of its own malware over the years.

Checkpoint's research is thorough and "looks legit," said Costin Raiu, a researcher with Moscow-based antivirus firm Kaspersky Lab, which has helped dissect some of the NSA's malware.

Balmas said a possible takeaway from his company's report was for spymasters weighing whether to keep software flaws secret to think twice about using a vulnerability for their own ends.

"Maybe it's more important to patch this thing and save the world," Balmas said. "It might be used against you."

© Thomson Reuters 2021


Is Samsung Galaxy S21+ the perfect flagship for most Indians? We discussed this on Orbital, our weekly technology podcast, which you can subscribe to via Apple Podcasts, Google Podcasts, or RSS, download the episode, or just hit the play button below.

Affiliate links may be automatically generated - see our ethics statement for details.
 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: NSA
Advertisement

Related Stories

Popular Mobile Brands
  1. Vivo V70, V70 Elite Confirmed to Launch in India Soon With These Chips
  2. Apple Confirms It Will Open Its Second Store in Mumbai 'Soon'
  3. Motorola Signature Goes on Sale for the First Time With These Offers
  4. Xiaomi Pad 8 Pro Tipped to Launch Globally With This Snapdragon Chip
  5. Realme 16 5G With 7,000mAh Battery Goes Official: See Features
  6. Oppo Reno 16 Series Possible Launch Timeline, Key Specifications Leaked
  7. Patang Now Streaming on Prime Video: Everything You Need to Know About Plot, Cast, and Mor
  8. iQOO 15 Ultra Spied in Leaked Hands-On Video; Display Details Confirmed
  9. Gandhi Talks OTT Release: Know When and Where to Watch it Online
  10. Noise Master Buds 2 to Offer ANC Improvements With New Earbud Design
  1. 45 Now Streaming Online: Where to Watch This Kannada Fantasy Thriller Online?
  2. Apple to Prioritize Premium iPhone Launches in 2026 Amid Memory Crunch: Report
  3. CERT-In Asks macOS, Google Chrome Users to Install Updates That Address Security Flaws, Data Theft Risks
  4. Oppo Reno 16 Series Early Leak Hints at Launch Timeline, Dimensity 8500 Chipset and Other Key Features
  5. Patang Now Streaming on Prime Video: Everything You Need to Know About Plot, Cast, and More
  6. Xiaomi Pad 8 Pro Global Variant Visits Geekbench; Tipped to Launch Alongside Xiaomi 17 Series
  7. Google Maps Is Adding Gemini Support for Walking and Cycling Navigation
  8. Gandhi Talks OTT Release Details: Everything You Need to Know About Vijay Sethupathi and Arvind Swami’s Silent Film
  9. OpenAI to Retire GPT-4o and Other Legacy AI Models in ChatGPT in February
  10. NASA, SpaceX Move Up Crew-12 Launch After ISS Medical Emergency
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.