China’s state security authorities warn of foreign spies hunting military info on messaging app


China’s Ministry of State Security on Saturday posted a short film calling on the public to enhance national security awareness, as the film describes a case of espionage in which a military enthusiast was deceived by a foreign spy disguised as a pretty girl on instant messaging app into giving up sensitive military information.

Adapted from a real case, the short film WeChat Trap narrates that the national security authorities have detected a spy from abroad. The spy added nearby people as friends through the virtual positioning of WeChat, an instant messaging mobile app used by a majority Chinese mobile phone users, pretending to be a pretty girl to lure individuals into sharing sensitive information in a refined and precise manner.

Read more…
Source: Global Times News


Sign up for our Newsletter


Related:

  • Tracking cyber activity in Eastern Europe

    March 30, 2022

    In early March, Google’s Threat Analysis Group (TAG) published an update on the cyber activity it was tracking with regard to the war in Ukraine. Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns. Government-backed actors from China, Iran, ...

  • Kaspersky, China Telecom, China Mobile named ‘threats to US national security’

    March 28, 2022

    The United Stations Federal Communications Commission (FCC) has labelled Kaspersky, China Mobile, and China Telecom as threats to national security. The three companies join Huawei, ZTE, Chinese radio-comms vendor Hytera, and Chinese video surveillance systems vendors Hangzhou Hikvision Digital Technology Company and Dahua Technology Company. Kaspersky is the first non-Chinese company to be added to the FCC’s ...

  • China APT group using Russia invasion, COVID-19 in phishing attacks

    March 28, 2022

    A China-based threat group is likely running a month-long campaign using a variant of the Korplug malware and targeting European diplomats, internet service providers (ISPs) and research institutions via phishing lures that refer to Russia’s invasion of Ukraine and COVID-19 travel restrictions. The ongoing campaign was first seen in August 2021 and is being tied to ...

  • Suspected DarkHotel APT resurgence targets luxury Chinese hotels

    March 21, 2022

    A new wave of suspected activity conducted by the DarkHotel advanced persistent threat (APT) group has been disclosed by researchers. Last week, Trellix researchers Thibault Seret and John Fokker said that a malicious campaign has been targeting luxury hotels in Macao, China since November 2021, and based on clues in the attack vector and malware used, ...

  • China captures powerful US NSA cyberspy tool

    March 14, 2022

    China captured a spy tool deployed by the US National Security Agency, which is capable of lurking in a victim’s computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of users’ information, according to a report the Global Times obtained from the National Computer Virus Emergency ...

  • Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments

    March 8, 2022

    UPDATE: The original post may not have provided full clarity that CVE-2021-44207 (USAHerds) had a patch developed by Acclaim Systems for applicable deployments on or around Nov. 15, 2021. Mandiant cannot speak to the affected builds, deployment, adoption, or other technical factors of this vulnerability patch beyond its availability. In May 2021 Mandiant responded to an APT41 intrusion ...