New Chinese Cyber Espionage Tool ‘Daxin’ Surfaces.


Advisory: Be careful of what you read on social media. The algorithms used by these platforms have no regard for Biblical truth. They target your emotions to keep you engaged on their site so their advertisers can drop more ads. These platforms exist to enrich their stockholders. Consider God’s promise to Believers in James 1:5, “If any of you lacks wisdom, you should ask God, who gives generously to all without finding fault, and it will be given to you.”

Featured Story

China’s “Daxin” Malware Used in Gov’t Espionage Operations ...

Security researchers at Symantec, a leading cybersecurity firm in the United States, have identified a “very sophisticated” Chinese hacking tool that has remained hidden for more than a decade.

According to a US official, the discovery was shared with the US administration in recent months, who then shared the information with overseas allies. On Monday, Symantec, a branch of Broadcom, released its research on the tool, which it calls Daxin.

Clayton Romans, associate director of the US Cybersecurity Infrastructure Security Agency, said, “It’s something we haven’t seen before” (CISA). “This is exactly the kind of information we’re looking for.”

Along with the new research paper, CISA emphasized Symantec’s participation in the JCDC, a collaborative public-private cybersecurity information sharing cooperation.

The Joint Cyber Defense Collaborative, or JCDC, is a group of federal defense agencies, including the FBI and the National Security Agency, as well as 22 U.S. technology businesses, that share information regarding ongoing cyberattacks.

A request for comment from the Chinese embassy in Washington was not returned.

“Without this public research, the capabilities of this malware would be exceedingly difficult to identify,” said Neil Jenkins, chief analytics officer at the Cyber Threat Alliance, a non-profit organization that brings together cybersecurity professionals to share data.

According to Vikram Thakur, a technical director at Symantec, the attribution to China is predicated on instances where Daxin components were coupled with other known, Chinese-linked computer hacker infrastructure or intrusions.

The discovery of Daxin was notable, according to Symantec experts, because of the scope of the incursions and the advanced nature of the program.

“The most recent known Daxin attacks happened in November 2021,” according to the research paper. “The attackers put a lot of effort into developing communication strategies that fit in with normal network traffic,” according to Daxin’s capabilities.

High-level, non-Western government agencies in Asia and Africa, including Ministries of Justice, were among Daxin’s victims, according to Thakur.

“Once a computer is infected, Daxin can be operated from anywhere in the world,” Thakur said. “That’s what sets the bar higher than the malware we see coming from Chinese-based groups.”

According to Romans, he is unaware of any affected companies in the United States, but there are infections all over the world, which the US government is assisting in notifying.

“Clearly, the actors have been effective not just in running campaigns but also in keeping their creation hidden for well over a decade,” Thakur added.

This is only the beginning of a tsunami of cyber infrastructure being prodded at as people inevitably test their skills behind a computer in light of global political unrest. The truth is, cyber security is a cat and mouse game. Vulnerabilities are inherent in these complex systems because they’re built for the end user, and not to prevent people from snooping around in the back end. Most of the cyber infrastructure currently in place could be considered practically naked in terms of cyber security because there are so many ways to exploit data. Why else would China go crazy for data like the leprechaun hoarding lucky charms in the old commercials? It’s valuable and its available; There’s a market for it, and you’re the product. Our complex way of life as a civilization has inadvertently created multiple back doors to be exploited by people more tech savvy than the rest of us. Technology related vulnerabilities can be expected to be magnified and exploited in the coming years for various reasons; political or criminally motivated.

No one man can make sense of this elaborate illusion cast over the common man of society, but collectively we can point out each limitation forced upon us and bring it forward as an injustice to the public. In Matthew 10:34 Jesus says: “Do not think that I have come to bring peace to the earth. I have not come to bring peace, but a sword.” We’re meant to go down preaching the gospel and guiding others to salvation. This could be considered the bravest task a man or woman of faith could undertake, but make no mistake it will bear fruit in the kingdom of heaven. Stay inquisitive in the word of God, and the world around you.


The 127 Faith Foundation: We do not solicit donations from “those on disability, on a fixed income, or those who cannot afford to give.” Please Pray!

Amazon “Wish List” for The 127 Faith Foundation

Or, make checks payable to:

The 127 Faith Foundation
PO Box 127
Pontotoc, TX 76869


Tagged In


The number of Orphans aging out of Child Protective Custody has grown at an alarming rate. The 127 Faith Foundation receives many requests each week to house them at our ranch. Our prayer is that the good people of our country will step up to the challenge and offer financial support for "the least among us." We need your help! StevieRay Hansen, Founder, The 127 Faith Foundation


Must Read


Other Sources




Latest News

Killing off the Useless Eaters Satan Soldiers Are Evil to the Bone —They’d Kill Their Own Mama — Huge Number of Post-vax Deaths & It’s Getting Worse

By StevieRay Hansen | October 5, 2022

Featured Story: World renowned CV19 critical care and pulmonary expert Dr. Pierre Kory says the data is clear the CV19 injections are “not safe, not…

Read More

Satan Soldiers At World Economic Forum Makes Censorship Pledge To ‘Tackle Harmful Content And

By StevieRay Hansen | October 5, 2022

Conduct Online’ Big Tech-Government Coalition to Control What People See Online…. Evil men plot against the godly and viciously attack them. The Lord laughs in…

Read More

Bill Gates, Half Human, Half Demon, Gates and Fauci Hints at Social Media Censorship

By StevieRay Hansen | October 5, 2022

Twitter Suspends mRNA Inventor Dr. Robert Malone After months of providing valuable Covid-19 information that runs counter to the official narrative, Twitter has finally banned…

Read More

According to a Top Biden Economist Who Lives in Lalaland, Farmers Should Increase Crop Production Based on “Price Signals” to Avoid Food Shortages. Only the Very Mentally Sick Would Consider This Concept Worktable

By StevieRay Hansen | October 5, 2022

HNewsWire Humanity-Will Be Ruled By a Godless Man Presiding Over an Evil Governmental System. The Bible Associates This End-Times Ruler With a Terrible Beast in…

Read More

Satan Soldier Known Liar Pfizer CEO Predicts ‘Return to Normal’ by Spring But Expects COVID-19 to Circulate for Years

By StevieRay Hansen | October 5, 2022

Featured Story: This guy is the worst of the worst, except for Fake Dr. Fauci. If you believe anything they says, you are seriously confused.…

Read More
Place Your Ad Here

We make every effort to acknowledge sources used in our news articles. In a few cases, the sources were lost due to a technological glitch. If you believe we have not given sufficient credit for your source material, please contact us, and we will be more than happy to link to your article.

Bryce Abbott

Leave a Comment