China’s state security authorities warn of foreign spies hunting military info on messaging app


China’s Ministry of State Security on Saturday posted a short film calling on the public to enhance national security awareness, as the film describes a case of espionage in which a military enthusiast was deceived by a foreign spy disguised as a pretty girl on instant messaging app into giving up sensitive military information.

Adapted from a real case, the short film WeChat Trap narrates that the national security authorities have detected a spy from abroad. The spy added nearby people as friends through the virtual positioning of WeChat, an instant messaging mobile app used by a majority Chinese mobile phone users, pretending to be a pretty girl to lure individuals into sharing sensitive information in a refined and precise manner.

Read more…
Source: Global Times News


Sign up for our Newsletter


Related:

  • Hackers are targeting telecoms companies to steal 5G secrets

    March 16, 2021

    A cyber-espionage campaign is targeting telecoms companies around the world with attacks using malicious downloads in an effort to steal sensitive data – including information about 5G technology – from compromised victims. Uncovered by cybersecurity researchers at McAfee, the campaign is targeting telecommunications providers in Southeast Asia, Europe and the United States. Dubbed Operation Diànxùn, researchers ...

  • Hafnium’s China Chopper: a ‘slick’ and tiny web shell for creating server backdoors

    March 11, 2021

    Researchers have provided insight into China Chopper, a web shell used by the state-sponsored Hafnium hacking group. Hafnium is a group of cyberattackers originating from China. The collective recently came into the spotlight due to Microsoft linking them to recent attacks exploiting four zero-day vulnerabilities — CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 — in Microsoft Exchange Server. Microsoft ...

  • Supernova malware clues link Chinese threat group Spiral to SolarWinds server hacks

    March 8, 2021

    A possible link to China has been noted by researchers examining the exploit of SolarWinds servers to deploy malware. On Monday, Secureworks’ counter threat unit (CTU) said that during late 2020, a compromised Internet-facing SolarWinds server was used as a springboard to deploy Supernova, a .NET web shell. Similar intrusions on the same network suggest that the ...

  • Chinese hackers cloned attack tool belonging to NSA’s Equation Group

    February 22, 2021

    Chinese threat actors “cloned” and used a Windows zero-day exploit stolen from the NSA’s Equation Group for years before the privilege escalation flaw was patched, researchers say. On Monday, Check Point Research (CPR) said the tool was a “clone” of software developed by the US National Security Agency (NSA)’s Equation Group, identified by FireEye in 2015 ...

  • BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech

    February 9, 2021

    Highly malleable, highly sophisticated and over 10,000 bytes of machine code. This is what Unit 42 researchers were met with during code analysis of this “bear” of a file. The code behavior and features strongly correlate with that of the WaterBear malware family, which has been active since as early as 2009. Analysis by Trend ...

  • A Chinese hacking group is stealing airline passenger details

    January 20, 2021

    A suspected Chinese hacking group has been attacking the airline industry for the past few years with the goal of obtaining passenger data in order to track the movement of persons of interest. The intrusions have been linked to a threat actor that the cyber-security has been tracking under the name of Chimera. Believed to be operating ...