Chinese State-Sponsored Hackers Intercept Text Messages Worldwide

By Nicole Hao November 3, 2019

An engineer from the Israeli company "" uses his expertise in social media commercial analysis to identify networks of fake users during at the group's office in the Israeli city of Bnei Brak near Tel Aviv on January 23, 2019. - A coalition of Israeli diplomats, programmers and hackers have joined forces to stave off threats -- including from hostile states -- by identifying networks on social media and getting them removed. (Photo by JACK GUEZ / AFP)        (Photo credit should read JACK GUEZ/AFP via Getty Images)
An Israeli engineer is searching fake users on social media at his office in the Israeli city of Bnei Brak near Tel Aviv on January 23, 2019. (JACK GUEZ/AFP via Getty Images)

FireEye published its study on text message security on Oct. 31, focusing on a new tool that APT41 is using: a malware named MESSAGETAP, to intercept people’s text messages worldwide. During the investigation, FireEye found out that hackers searched keywords such as the names of “foreign high-ranking individuals of interest to the Chinese intelligence services,” as well as political leaders, military and intelligence organizations, and political movements.

One particular pattern emerged: “APT41 targets industries in a manner generally aligned with China’s Five-Year economic development plans” and Beijing’s ten-year’s plan “Made in China 2025,” according to the report. The hacker group also gathers intelligence ahead of important events, such as mergers and acquisitions (M&A) and political events. But beginning in mid-2015, the hackers “have moved toward strategic intelligence collection and establishing access and away from direct intellectual property theft.”

Read the rest here.

Source:The Epoch Times

Inline Feedbacks
View all comments


"For everyone practicing evil hates the light and does not come to the light, lest his deeds should be exposed." [John 3:20] Nov. 06, 2019