China-Linked Hackers Target Military, Government Texts, FireEye Says

A state-linked Chinese hacking group is using malware to steal SMS text messages from high-ranking military and government targets, according to cybersecurity company FireEye. From a report: The hacking technology, known as MESSAGETAP, “allows China to efficiently steal data from multitudes of sources from one location,” Steven Stone, FireEye’s director of advanced practices, said in a statement. “Espionage-related theft and intrusions have been long occurring, but what is new is the vast scale due to the use of this tool.” The company’s finding, released in a blog on Thursday, underscores the growing concerns about China’s use of technology for espionage and the theft of intellectual property. Telecommunications pose a special concern, as the U.S. seeks to persuade its allies not to build their next-generation networks with tools from Chinese companies such as Huawei. But even in networks that China hasn’t built, sophisticated hacking operations might allow access to data. In 2019 alone, FireEye observed eight attempts to target telecommunications entities by groups with suspected links to the Chinese government. Four of these hacking attempts were conducted by the group known as APT41 that is now using MESSAGETAP.

Read more of this story at Slashdot.

Source:
https://it.slashdot.org/story/19/10/31/155253/china-linked-hackers-target-military-government-texts-fireeye-says?utm_source=rss1.0mainlinkanon&utm_medium=feed