Site icon The Punching Bag Post

German Intelligence: China’s Cyberspying Runs Deep

<p class&equals;"p1">A top German intelligence officer said over the week that China is using social networks to spy on German citizens&period;<&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">Hans-Georg Maassen&comma; the head of Germany&&num;8217&semi;s domestic intelligence agency&comma; said on Sunday that his agency&comma; BfV&comma; has identified at least 10&comma;000 German citizens that have been targeted by China&rsquo&semi;s cyber espionage activities&period;&nbsp&semi;Many of the victims were politicians and officials at German government agencies&period; &nbsp&semi;<&sol;span>&nbsp&semi;<&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">&&num;8220&semi;This is a broad-based attempt to infiltrate in particular parliaments&comma; ministries and government agencies&comma;&&num;8221&semi; said Maassen&period;<&sol;span><&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">By using the professional networking platform Linkedin&comma; Chinese agents have created false profiles as headhunters&comma; consultants and researchers to collect information on the targeted individuals&period;<&sol;span><&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">&&num;8220&semi;Chinese intelligence services are active on networks like LinkedIn and have been trying for a while to extract information and find intelligence sources in this way&comma;&&num;8221&semi; said the agency&period;<&sol;span><span class&equals;"s1">&nbsp&semi;<&sol;span><&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">BfV named the fake profile with the account name &&num;8220&semi;Laeticia Chen&comma;&&num;8221&semi; who held the job title of manager at the &&num;8220&semi;China Center of International Politics and Economy&period;&rdquo&semi; The profile image for this account was stolen from an online fashion catalog&period;<&sol;span><&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">Specifically&comma; the hackers are targeting service providers&period; Maassen pointed out that the agents are using &ldquo&semi;supply-chain attacks&comma;&rdquo&semi; where they strategically target IT workers&period;<&sol;span><&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">&ldquo&semi;The infections are difficult to detect&comma; since network connections between service providers and their customers aren&rsquo&semi;t suspicious&comma;&rdquo&semi;&nbsp&semi;said the agency to the <em>Associated Press<&sol;em>&period; &&num;8220&semi;This gives the attacker an even better disguise than before&period;&&num;8221&semi;<&sol;span><span class&equals;"s1">&nbsp&semi;<&sol;span><&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">As usual&comma; China is denying these claims&period;<&sol;span><span class&equals;"s1">&nbsp&semi;<&sol;span><&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">&&num;8220&semi;We hope the relevant German organizations&comma; particularly government departments&comma; can speak and act more responsibly&comma; and not do things that are not beneficial to the development of bilateral relations&comma;&&num;8221&semi; said Lu Kang&comma; a Chinese Foreign Ministry spokesman&period;<&sol;span><span class&equals;"s1">&nbsp&semi;<&sol;span><&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">But this is just one of the many recent instances where China was caught cyberspying&period;<&sol;span><&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">&ldquo&semi;In October&comma; the Czech Republic&&num;8217&semi;s Security Information Service &lpar;SIS&rpar; warned that Chinese spying increased in the past year&comma; using available information networks to promote interests in the EU country&comma; including attempting to suppress concerns about Tibet&comma;&rdquo&semi; writes <em>DW<&sol;em>&period; &ldquo&semi;The Czech intelligence agency added that China also engaged higher-risk cyber espionage activities&comma; according to military intelligence sources&period;&rdquo&semi;<&sol;span><span class&equals;"s1">&nbsp&semi;<&sol;span><&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">Earlier this year&comma; the billionaire business magnate Guo Wengui said that China has a huge spy network in the U&period;S&period; with 25&comma;000 agents&period; He also said the country&rsquo&semi;s intelligence budget is between &dollar;3 to &dollar;4 billion a year&period;<&sol;span><&sol;p>&NewLine;<p class&equals;"p1"><span class&equals;"s1">&ldquo&semi;They have successfully penetrated all the major defense weapons suppliers of the US government&comma;&&num;8221&semi; said Guo&period; &&num;8220&semi;The scale of their operations is mind-boggling&period;&rdquo&semi;&nbsp&semi;<&sol;span><&sol;p>&NewLine;<p class&equals;"p1"><strong>Author&&num;8217&semi;s note&colon;<&sol;strong> This isn&rsquo&semi;t surprising to us&comma; but it is alarming how aggressive China&&num;8217&semi;s cyber attacks are getting&period; As technology advances&comma; the more we become vulnerable to these types of attacks&period; This means that our cybersecurity needs to be one step ahead&period;<&sol;p>&NewLine;

Exit mobile version