Honolulu Star-Advertiser

Monday, April 29, 2024 81° Today's Paper


Top News

German intelligence warns of increased Chinese cyberspying

1/1
Swipe or click to see more

ASSOCIATED PRESS

Hans-Georg Maassen, head of the German Federal Office for the Protection of the Constitution, arrived for a public hearing, Oct. 5, at the parliamentary control committee of the German federal parliament, Bundestag, in Berlin, Germany. The head of Germany’s domestic intelligence agency, Maassen warned, today, that China is using computer social networks to target sources of information.

BERLIN >> The head of Germany’s domestic intelligence agency warned today that China allegedly is using social networks to try to cultivate lawmakers and other officials as sources.

Hans-Georg Maassen said his agency, known by its German acronym BfV, believes more than 10,000 Germans have been targeted by Chinese intelligence agents posing as consultants, headhunters or researchers, primarily on the social networking site LinkedIn.

“This is a broad-based attempt to infiltrate in particular parliaments, ministries and government agencies,” Maassen said.

In addition, Chinese hackers increasingly are launching attacks on European companies through trusted suppliers, he alleged.

The BfV established a task force early this year which examined the use of fake profiles on social networks over nine months. The agency provided journalists with what it said were eight of the most prolific fake profiles on LinkedIn used by alleged Chinese spies.

Using names such as Lily Wu, Laeticia Chen or Alex Li, the profiles sport impressive resumes, hundreds of contacts and attractive pictures of young professionals.

The agency also named six organizations it alleged Chinese spies use to cloak their approaches, including one called the Association France Euro-Chine and another named Global View Strategic Consulting.

Messages seeking comment from the organizations weren’t immediately returned.

Maassen warned that Chinese cybergroups also were using so-called “supply-chain attacks” to get around companies’ online defenses.

Such attacks target IT workers and others who work for trusted service providers to send malicious software into the networks of organizations the attackers are interested in.

“The infections are difficult to detect, since network connections between service providers and their customers aren’t suspicious,” the BfV said. “This gives the attacker an even better disguise than before.”

Frank Jordans contributed to this report.

By participating in online discussions you acknowledge that you have agreed to the Terms of Service. An insightful discussion of ideas and viewpoints is encouraged, but comments must be civil and in good taste, with no personal attacks. If your comments are inappropriate, you may be banned from posting. Report comments if you believe they do not follow our guidelines. Having trouble with comments? Learn more here.