Finnish intelligence identifies Chinese state-linked group behind cyber-attack
March 19, 2021 3 Comments

FINLAND’S INTELLIGENCE AGENCY HAS identified a hacker group with ties to the Chinese state as the culprit of an attack of “exceptional” magnitude and intensity that targeted the Finnish Parliament last year. The attack was reported in December 2020, but had been going on for several weeks prior to being discovered by the information security department of the Eduskunta (Parliament of Finland).
Finland’s National Bureau of Investigation (NIB) said at the time that the attack had compromised parts of the Parliament’s internal communication system, including a number of Parliamentary email accounts. Some of these accounts belonged to members of Parliament, while others belonged to members of staff, according to the NIB.
Little became known about the attack in the months after the incident was first reported by Finnish media. But on Thursday the Finnish Security and Intelligence Service (SUPO) issued a press release about the incident. It said that the attack was likely part of a state-sponsored cyber espionage operation. It also identified those responsible for the attack as Advanced Persistent Threat (APT) 31. The SUPO report did not name the state that sponsored the attack. However, several private computer security firms have linked APT31 with the Chinese government.
The SUPO report stated that the attack on the Finnish Parliament was neither random nor experimental. On the contrary, it was aimed at acquiring specific information stored at the Parliament’s computer servers. Although the motive for the attack is still being investigated, it is possible that it was part of an effort “to gather intelligence to benefit a foreign state or to harm Finland’s interests”, said SUPO. The spy agency added that it would not provide further details about the case while it remains the subject a criminal investigation.
► Author: Joseph Fitsanakis | Date: 19 March 2021 | Permalink
CITING NATIONAL SECURITY GROUNDS, the government of Lithuania has canceled an agreement with a Chinese-owned company to supply baggage-scanning equipment at airports across the Baltic country. The Beijing-based company, Nuctech, is owned by Tsinghua Tongfang, which is in turn controlled by the China National Nuclear Corporation (CNNC). Tasked with managing China’s nuclear fuel supply and development program, CNCC is owned by the Chinese government.
THREE CHINESE NON-OFFICIAL cover intelligence officers, who were working in London under journalistic cover, were expelled from Britain in the past year, according to a new report. The claim was made on Thursday by The Telegraph newspaper, which
CHINESE GOVERNMENT OFFICIALS HAVE denied claims that Beijing consented to, and even supported, the coup that took place in Myanmar on Monday. The Southeast Asian country’s armed forces seized control of key government installations in the early hours of Monday, before announcing that parliament had been dissolved. Hundreds of politicians, including Myanmar’s State Counsellor Aung San Suu Kyi, have been arrested, and the fate of many of them remains unknown. The military claims that the general elections of November 8, 2020, which gave Aung San Suu Kyi’s National League for Democracy party 61 percent of the vote, were fraudulent.
The Afghan government reportedly expelled from the country 10 Chinese intelligence officers on Saturday, after they were found to have contacts with pro-Taliban groups. Meanwhile the White House was recently briefed about claims that Beijing offered Afghan militants bounties for killing American soldiers.


A former employee of British intelligence has strongly denied accusations, which surfaced last week in the European press, that he gave secrets to two Chinese operatives in exchange for money. Some news outlets have suggested that he is currently under investigation by at least one European government.
A court in Paris has sentenced to prison two former employees of France’s external intelligence agency, who were accused of spying for the government of China. A third person, the wife of one of the accused, was also handed a jail sentence.
• In-fighting erupts between Syrian intelligence and army in Damascus. Violent clashes broke out between Syrian regime intelligence forces and local militias affiliated with the army’s 4th Division and national defense in Damascus’ countryside, local media sources reported. Sporadic fighting
The trial of two French former intelligence officers begins today in Paris, with the two men accused by French authorities of having spied for China in the 1990s and 2000s. French officials have remained largely silent on the two cases, but media reports have suggested that the two former intelligence officers were found to have carried out espionage tasks for the Chinese government.
A
Russian prosecutors have accused one of the country’s most respected hydroacoustics specialists, and globally recognized expert on the Arctic region, of spying for Chinese intelligence. This development highlights the competitive relationship between the two neighboring countries, who in recent years have tended to work together against what they perceive as a common threat coming from the United States.






Chinese hackers used Facebook to target Uighur activists with malware
March 25, 2021 by Joseph Fitsanakis 4 Comments
CHINESE HACKERS USED FAKE Facebook accounts to target individual activists in the expatriate Uighur community and infect their personal communications devices with malware, according to Facebook. The social media company said on Wednesday that the coordinated operation targeted approximately 500 Uighur activists living in the United States, Canada, Australia, Syria, Turkey and Kazakhstan.
At least 12 million Uighurs, most of them Muslims, live in China’s Xinjiang region, which is among the most impoverished in the country. The Chinese state is currently engaged in a campaign to quell separatist tendencies among some Uighurs, while forcibly integrating the region’s population into mainstream culture through a state-run program of forcible assimilation. It is believed that at least a million Uighurs are currently living in detention camps run by the Communist Party of China, ostensibly for “re-education”. Meanwhile, thousands of Uighur expatriates, most of whom live in Kazakhstan and Turkey, are engaged in a concerted campaign aimed at airing human-rights violations occurring in the Chinese detention camps throughout Xinjiang.
According to Facebook, Chinese hackers set up around 100 accounts of fake personas claiming to be journalists with an interest in reporting on human rights, or pro-Uighur activists. They then befriended actual Uighur activists on Facebook and directed them to fake websites that were designed to resemble popular Uighur news agencies and pro-activist websites. However, these websites were carriers of malware, which infected the personal communications devices of those who visited them. Some Facebook users were also directed to fake smartphone application stores, from where they downloaded Uighur-themed applications that contained malware.
Facebook said it was able to detect and disrupt the fake account network, which has now been neutralized. It also said it was able to block all fake domains associated with the hacker group, and notified users who were targeted by the hackers. It added that its security experts were not able to discern direct connections between the hackers an the Chinese state.
► Author: Joseph Fitsanakis | Date: 25 March 2021 | Permalink
Filed under Expert news and commentary on intelligence, espionage, spies and spying Tagged with China, computer hacking, Facebook, News, separatism, social networking, Uighurs