German Spies Warn Of Chinese Espionage

China is using fake LinkedIn profiles to gather information on German officials and politicians, the German intelligence agency (BfV) has said. The agency alleges that Chinese intelligence used the networking site to target at least 10,000 Germans, possibly to recruit them as informants.

It released a number of fake profiles allegedly used for this purpose.

BfV head Hans-Georg Maassen said the accounts show China's efforts to subvert top-level German politics.
"This is a broad-based attempt to infiltrate in particular parliaments, ministries and government agencies," he said.

China has denied similar allegations of cyber espionage in the past and has not yet responded to the German allegation.

The BfV published eight of what they say are the most active profiles used to contact German LinkedIn users. They are designed to look enticing to other users, and promote young Chinese professionals -who do not exist. Some of the accounts include "Allen Liu", said to be a human resources manager at an economic consultancy, and "Lily Wu", who reportedly works at a think tank in eastern China.

The BfV says both accounts are fake. The agency is increasingly worried that Chinese intelligence is using the method to recruit high-ranking politicians as informants. 

They asked users who believed they had been targeted by suspect accounts to contact them. Last year, the BfV said they had detected "increasingly aggressive cyber-espionage" including "intensifying" attempts to influence September's parliamentary elections.

They said the hacker group known as "Fancy Bear" or APT28 was especially active - and it is believed to be controlled by the Russian state.

BBC

You Might Also Read

German Police To Hack Suspect Devices:

German Spy Chief Fears Russian Interference In  2017 Elections:

You Should Read LinkedIn's New Privacy Policy Carefully:
 

 

« ISIS Warns Of Imminent Cyber Attacks On The US
MH370 Loss Could Have Been A Remote Skyjacking »

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Smarttech247

Smarttech247

Smarttech247 deliver a range of cyber security solutions, including cognitive security services using IBM Watson for Cybersecurity, SIEM, Compliance & Governance, and Penetration Testing.

Acorus Networks

Acorus Networks

Acorus Networks provides a Cloud infrastructure service to protect against increasingly sophisticated denial of service attacks.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Jolocom

Jolocom

Jolocom builds decentralized software solutions that enable people, organizations, and machines to own and control their identity information.

Red Canari

Red Canari

Red Canari are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.