German intelligence warns of increased Chinese cyberspying

162 Hits

Hans-Georg Maassen, head of the German Federal Office for the Protection of the Constitution, arrives for a public hearing at the parliamentary control committee of the German federal parliament, Bundestag, in Berlin, Germany.  The head of Germany's domes

Hans-Georg Maassen, head of the German Federal Office for the Protection of the Constitution, arrives for a public hearing at the parliamentary control committee of the German federal parliament, Bundestag, in Berlin, Germany. The head of Germany's domes

BERLIN (AP) — The head of Germany's domestic intelligence agency warned Sunday that China allegedly is using social networks to try to cultivate lawmakers and other officials as sources.

Hans-Georg Maassen said his agency, known by its German acronym BfV, believes more than 10,000 Germans have been targeted by Chinese intelligence agents posing as consultants, headhunters or researchers, primarily on the social networking site LinkedIn.

"This is a broad-based attempt to infiltrate in particular parliaments, ministries and government agencies," Maassen said.

In addition, Chinese hackers increasingly are launching attacks on European companies through trusted suppliers, he alleged.

The BfV established a task force early this year which examined the use of fake profiles on social networks over nine months. The agency provided journalists with what it said were eight of the most prolific fake profiles on LinkedIn used by alleged Chinese spies.

Using names such as Lily Wu, Laeticia Chen or Alex Li, the profiles sport impressive resumes, hundreds of contacts and attractive pictures of young professionals.

The agency also named six organizations it alleged Chinese spies use to cloak their approaches, including one called the Association France Euro-Chine and another named Global View Strategic Consulting.

Messages seeking comment from the organizations weren't immediately returned.

Maassen warned that Chinese cybergroups also were using so-called "supply-chain attacks" to get around companies' online defenses.

Such attacks target IT workers and others who work for trusted service providers to send malicious software into the networks of organizations the attackers are interested in.

"The infections are difficult to detect, since network connections between service providers and their customers aren't suspicious," the BfV said. "This gives the attacker an even better disguise than before."

© Samoa Observer 2016

Developed by Samoa Observer in Apia