• Home
  • About
  • Privacy Policy
Thursday, June 12, 2025
  • Login
CHINA-ARMS
  • Home
  • General
  • New Weapons
  • Army
  • Air Force
  • Navy
  • Rocket Force
  • Exercises
  • Global
  • Politics
  • Wiki
No Result
View All Result
  • Home
  • General
  • New Weapons
  • Army
  • Air Force
  • Navy
  • Rocket Force
  • Exercises
  • Global
  • Politics
  • Wiki
No Result
View All Result
China-Arms
No Result
View All Result
Home General

China State Security Department: Overseas ‘Cyber Spy’ Breach in Military-Civil Fusion Enterprise Platform

February 16, 2024
in General
Reading Time: 2 mins read
A A
0
319
SHARES
2.5k
VIEWS
Share on FacebookShare on Twitter

On the 16th, the official WeChat account of China’s State Security Department published an article titled “How Do ‘Cyber Spies’ Exploit Opportunities?” It pointed out that the current cyberspace has become an important battleground for overseas intelligence agencies to conduct espionage activities against China, and the cybersecurity situation is becoming increasingly severe.

You Might Also Like

H-6 and Y-20 Deployed to South China Sea Ahead of Security Forum — Signal to U.S. and Philippines, Analysts Say

China Recreates Taiwan’s Presidential Zone in Inner Mongolia, Says Japanese Media

Egypt Negotiates with China on Type 039A Submarine Purchase, Including Technology Transfer

The State Security Department pointed out that in recent years, overseas “cyber spies” have taken advantage of inadequate security precautions, negligence, and the pursuit of convenience in important domestic units, continuously attacking the information systems of key domestic units, departments, and enterprises through various means. They establish covert transmission channels to continuously steal important sensitive data, endangering China’s data and cybersecurity.

On the 16th, the State Security Department specifically mentioned overseas “cyber spies” paying high attention to “software supply chain” enterprises. (China News Agency)

The article specifically mentioned that overseas “cyber spies” often use various network mapping platforms to scan known network vulnerabilities in bulk. Once they discover that important units have not patched vulnerabilities in a timely manner, they immediately launch targeted attacks to steal data. Recently, the national security agencies found that a military-civil fusion enterprise, including its office platform, had multiple systems with high-risk security vulnerabilities due to outdated software updates, leading to a “wide-open door.” Overseas “cyber spies” discovered these vulnerabilities in the enterprise and exploited them to invade and implant Trojan viruses, stealing important production and customer data from the enterprise, thereby harming China’s military equipment technology development and threatening China’s military and technological security.

The State Security Department specifically pointed out that overseas “cyber spies” pay close attention to “software supply chain” enterprises, attempting to continuously attack relevant enterprises through phishing emails, network scanning, etc., and targeting system administrators with system management permissions as the primary targets for espionage.

After further analysis, it was discovered that previously, when this enterprise was testing a network system, it deployed a testing device and granted various permissions to it. After the testing work ended, the device was not taken offline in a timely manner and continued to run unattended. Overseas “cyber spies” seized this opportunity, using it as a springboard to penetrate the internal network, launch cyber attacks, and successfully steal the core data of the enterprise, resulting in the theft of important basic data for China’s livelihood.

The State Security Department emphasized that key units for anti-espionage security should strengthen daily security management of confidential matters, places, carriers, etc., and adopt physical anti-espionage measures such as isolation reinforcement, closed management, and setting up alerts. They should also take corresponding technical measures and other necessary measures in accordance with the requirements and standards of anti-espionage technical prevention to strengthen technical anti-espionage measures for key departmental locations, network facilities, and information systems. Citizens and organizations are urged to work together with national security agencies to carry out security prevention, investigation, and disposal work against cyber espionage, and to report suspected cyber espionage activities to national security agencies in a timely manner.

Previous Post

Analysis: All 3 Carriers to Carry J-35, Closing China-U.S. Carrier Tech Gap

Next Post

Saudi Arabia’s Embrace of Wing Loong-10 Highlights Shifting Dynamics in Arms Trade

Related News

H-6 and Y-20 Deployed to South China Sea Ahead of Security Forum — Signal to U.S. and Philippines, Analysts Say

H-6 and Y-20 Deployed to South China Sea Ahead of Security Forum — Signal to U.S. and Philippines, Analysts Say

May 29, 2025
0

In mid-May, China deployed two H-6 long-range strategic bombers to Yongxing Island, a disputed island in the South China Sea...

China Recreates Taiwan’s Presidential Zone in Inner Mongolia, Says Japanese Media

China Recreates Taiwan’s Presidential Zone in Inner Mongolia, Says Japanese Media

May 21, 2025
0

The Japanese news program news zero recently aired a series of reports focused on the theme of a “Taiwan contingency,”...

Egypt Negotiates with China on Type 039A Submarine Purchase, Including Technology Transfer

Egypt Negotiates with China on Type 039A Submarine Purchase, Including Technology Transfer

May 1, 2025
0

At the end of last year, Egypt and China entered into deep negotiations over the procurement of China’s Type 039A...

Beijing to Hold Grand Parade for 80th Victory Anniversary

Beijing to Hold Grand Parade for 80th Victory Anniversary

March 8, 2025
0

This year marks the 80th anniversary of the Chinese People's War of Resistance Against Japan and the World Anti-Fascist War....

Next Post
Saudi Arabia’s Embrace of Wing Loong-10 Highlights Shifting Dynamics in Arms Trade

Saudi Arabia's Embrace of Wing Loong-10 Highlights Shifting Dynamics in Arms Trade

China’s Response to Fatal Incident Near Kinmen: Asserting New Governance Norms in Cross-Strait Relations

China's Response to Fatal Incident Near Kinmen: Asserting New Governance Norms in Cross-Strait Relations

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow us

No Result
View All Result

YouTube channel of China-Arms

Chinese Air Force Enhances Training with Simulations
Chinese Naval Academy Recruitment Video
72nd Group Army Trains Combat-Ready Squad Leaders
00:00:00 PLA Central Theater Army
00:02:31 Xinjiang Military District Border Regiment
00:02:47 China’s Armed Police in Tibet
00:03:06 Gulf of Aden Escort Fleet
PLA Central Theater Forces Carry Out War-Ready Exercises and More
Chinese Army Engages in CBRN Defense and Amphibious Landing Exercises
Inside China’s Latest Army Training
China’s Plateau Sharpshooter – Yang Yougang, Elite of the Armed Police
The 71st Group Army Conducts Air Defense Drill
Chinese Army Amphibious Armored Vehicle Drill
Load More... Subscribe

Recent Comments

  • Masud on PLA Showcases Heavily Modified Amphibious Armored Vehicle with HJ-10 Missiles
  • X on Three Type 055 Destroyers Head to South China Sea for Six-Day Naval Exercise
  • FabioM on Three Type 055 Destroyers Head to South China Sea for Six-Day Naval Exercise
  • A on Three Type 055 Destroyers Head to South China Sea for Six-Day Naval Exercise
  • O'Brien on J-16’s heavier payload than F-15EX demonstrated

Tags

China's Aircraft Carriers China's arms exports China's homemade aircraft carriers China's homemade aircraft engines China's hypersonic weapons China's J-31 stealth fighter China's military drones China's military exercises near Taiwan China's Military Reform China's space weapons China's Su Series Fighters China's Tibet Military district China's Type 055 destroyer China-India Border Conflicts China-Pakistan military cooperation China-US tensions China and Japan China and Russia China vs Russia military China vs USA military power China’s Eastern Theater Command China’s Stealth Fighters Chinese J-10B fighter H-6K bomber H-20 stealth bomber India vs China military power comparison J-10C jet fighter J-16 fighter J-20 fighter jet J-20 vs F-22 Japan vs China military PL-15 air-to-air missile Russia-Ukraine war South China Sea Disputes The Taiwan Issue Type 003 aircraft carrier Type 075 amphibious assault ship Type 15 tank US-China war risk WS-10 Taihang engine WZ-10 attack helicopter Y-20 military transport aircraft Z-20 helicopter Zhang Zhaozhong Zhuhai Airshow 2021

Profile

China military news since 2015.

Archives

© 2015-2024 China-Arms

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • General
  • New Weapons
  • Army
  • Air Force
  • Navy
  • Rocket Force
  • Exercises
  • Global
  • Politics
  • Wiki

© 2015-2024 China-Arms

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.