China Accuses The US Of Spying On Huawei

The persistent and escalating argument between Washington and Beijing over technology and security issues has taken a new twist, with China accusing the US of hacking into the core servers of Chinese telecoms firm Huawei in in attempts to steal critical data. 

The charges of digital spying being made by China's Ministry of State Security (MSS) relate to events dating from 2009 and come at a time of increasing geopolitical tensions between the two countries.

In a message posted on WeChat, the Chinese government said US intelligence agencies have "done everything possible" to conduct surveillance, secret theft, and intrusions on many countries around the world, including China, using a "powerful cyber attack arsenal." Specifics about the alleged hacks were not shared. It focused on the US National Security Agency's (NSA) Computer Network Operations as having "repeatedly carried out systematic and platform-based attacks" against the country to plunder its "important data resources."

The post went on to claim that the cyber-warfare intelligence-gathering unit hacked Huawei's servers in 2009 and that it had carried out "tens of thousands of malicious network attacks" on domestic entities, including the Northwestern Polytechnical University.

A further allegation is that Washington has forced the implantation of backdoors into software and equipment produced by technology companies, enlisting the help of its global technology brands to monitor and steal data.

China's National Computer Virus Emergency Response Centre (NCVERC) is said to have isolated a spyware artifact known as 'Second Date' when dealing with an incident at the public research university that was allegedly developed by the NSA and stealthily implanted on "thousands of network devices in many countries around the world."

Details about Second Date were recently reported by South China Morning Post and China Daily, describing it as a cross-platform malware capable of monitoring and hijacking network traffic as well as injecting malicious code. Germany, Japan, South Korea, India, and Taiwan are believed to be some of the countries targeted by the spyware. "The US intelligence agency has used these large-scale weapons and equipment to carry out cyber attacks and cyber espionage operations for more than ten years against China, Russia and other 45 countries and regions around the world," MSS said, adding the attacks targeted telecom, scientific research, economy, energy and military sectors.

MSS also has said that the US has forced technology companies to install backdoors in their software and equipment to conduct cyber espionage and steal data and to track mobile phone users.

"It has long been an open secret that the United States has long relied on its technological advantages to conduct large-scale eavesdropping on countries around the world, including its allies, and carried out cyber theft activities," the MSS said, adding Russia, Iran, China, and North Korea are its main targets... At the same time, the United States is trying its best to portray itself as a cyber-attack victim, inciting and coercing other countries to join the so-called 'clean network' program under the banner of maintaining network security, in an attempt to eliminate Chinese companies from the international network market."

In July 2023, after Microsoft said that a China-linked espionage campaign had been mounted by an actor codenamed Storm-0558 targeting two dozen organisations in the US and Europe, China responded by calling the US "the world's biggest hacking empire and global cyber thief."

The Hacker News:     Weixin:     South China Morning Post:     China Daily:     The Times Of India:    

The Register:     Security Boulevard                                      Image; geralt

You Might Also Read: 

Spy Agencies Warn Of New Threats From Chinese Hackers:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« British Online Safety Bill Will Restrict Social Media
The US Security Standard For IoT Devices »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

KLDiscovery

KLDiscovery

KLDiscovery is a global leader in delivering best-in-class eDiscovery, information governance and data recovery solutions.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

Asia Center of Excellence for Smart Technologies (ACES)

Asia Center of Excellence for Smart Technologies (ACES)

ACES is a one-stop competency center and incubator for the development of Industry 4.0 and associated technologies including cybersecurity, robotics, IoT and Big Data.

Smart Hive

Smart Hive

Smart Hive has created a platform that will allow organizations to share real-time, relevant and actionable threat intelligence among each other while maintaining confidentiality.

PixelPlex

PixelPlex

PixelPlex is a blockchain and custom software development company with offices and developers in New York, Geneva, and Seoul.

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

ShieldApps

ShieldApps

ShieldApps comprehensive suite of products is designed to protect your personal devices from privacy threats, including hacking attempts, online tracking, fingerprinting, phishing, malware, and more.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

SeeMetrics

SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

Lineaje

Lineaje

Lineaje solves critical Software Supply Chain security problems faced by every organization that builds, uses or sells software.

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.