German Spies Warn Of Chinese Espionage

China is using fake LinkedIn profiles to gather information on German officials and politicians, the German intelligence agency (BfV) has said. The agency alleges that Chinese intelligence used the networking site to target at least 10,000 Germans, possibly to recruit them as informants.

It released a number of fake profiles allegedly used for this purpose.

BfV head Hans-Georg Maassen said the accounts show China's efforts to subvert top-level German politics.
"This is a broad-based attempt to infiltrate in particular parliaments, ministries and government agencies," he said.

China has denied similar allegations of cyber espionage in the past and has not yet responded to the German allegation.

The BfV published eight of what they say are the most active profiles used to contact German LinkedIn users. They are designed to look enticing to other users, and promote young Chinese professionals -who do not exist. Some of the accounts include "Allen Liu", said to be a human resources manager at an economic consultancy, and "Lily Wu", who reportedly works at a think tank in eastern China.

The BfV says both accounts are fake. The agency is increasingly worried that Chinese intelligence is using the method to recruit high-ranking politicians as informants. 

They asked users who believed they had been targeted by suspect accounts to contact them. Last year, the BfV said they had detected "increasingly aggressive cyber-espionage" including "intensifying" attempts to influence September's parliamentary elections.

They said the hacker group known as "Fancy Bear" or APT28 was especially active - and it is believed to be controlled by the Russian state.

BBC

You Might Also Read

German Police To Hack Suspect Devices:

German Spy Chief Fears Russian Interference In  2017 Elections:

You Should Read LinkedIn's New Privacy Policy Carefully:
 

 

« ISIS Warns Of Imminent Cyber Attacks On The US
MH370 Loss Could Have Been A Remote Skyjacking »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Standards Council of Canada (SCC)

Standards Council of Canada (SCC)

SCC leads and facilitates the development and use of national and international standards and accreditation services in Canada.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Virtual Infosec Africa (VIA)

Virtual Infosec Africa (VIA)

Virtual InfoSec Africa (VIA) is a wholly-owned Ghanaian company specializing in information security and cybersecurity solutions and services.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

Razilio

Razilio

Razilio is a boutique cybersecurity consultancy located in Sydney, Australia and serving the world.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.