![](/uploads/1/2/6/3/126316920/367663914.jpg)
![War War](/uploads/1/2/6/3/126316920/149067170.jpg)
The cookie settings on this website are set to 'allow cookies' to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click 'Accept' below then you are consenting to this.
Chinese flag waves in front of the Great Hall of the People in Beijing, China, Oct. 29, 2015 - file.(REUTERS/Jason Lee)The key strategic aim is to get inside U.S. Company networks then spread quickly within those networks, Check Point said.China builds its cyber warfare tools by tapping into U.S. Computer exploit tools, according to Check Point.
One way of doing this is the so-called exploit tactics. American companies spend millions on ways to combat computer exploits used for cyber attacks. This has “inspired Chinese hackers to build a secret path to garnish those resources for their own,” Check Point said.The report cites a from cybersecurity giant Symantec outlining an NSA (National Security Agency)-like exploit used by a Chinese state-sponsored group named APT3 prior to 2017, the year in which a number of NSA exploits were leaked by a group named The Shadow Brokers.“The leak of NSA tools by the Shadow Brokers in 2017 has shown how the US has immense in-house exploit capabilities. The Chinese would obviously want to get to the same capabilities, but their way to gain those powers is different from that of the U.S.” the report said.Check Point: how the Chinese do itCheck Point Research analyzed the malicious tool used by APT3 and learned that the Chinese group was monitoring computers that were compromised by the NSA, capturing traffic from the attack then leveraging it to reverse engineer vulnerabilities.Usually, these tools are built in-house or purchased from a third party, Check Point said. But in this case the tools obtained by the Chinese are reverse engineered from the U.S.
For use in their own hacking arsenal, according to Check Point.“The Chinese were able to build their own exploitation tool that looked almost the same as the American one but was actually built in China,” the report said.' This.suggests a narrative where China and the US are engaged in a cyber arms race to develop new exploits,' the report added.Fox News has reached out to the Chinese government with a request for comment on this story.
![](/uploads/1/2/6/3/126316920/367663914.jpg)