• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

China-backed hackers stole text messages and phone records in push for intelligence

6106

China-backed hackers stole text messages and phone records in push for intelligence

Chinese hackers who were backed by the State were reported to have hacked the telecommunication firms in what is said to be for the “geopolitical interest” State-backed Chinese hackers were able to hack into telecommunications firms and steal the contents of text messages of “geopolitical interest” to Beijing, according to a new report.

The group, known as APT41, used a malicious piece of software or malware dubbed “Messagetap” to access servers responsible for sending and storing text messages, cybersecurity firm FireEye said. The company did not disclose the name of the telecom company.

Once in, the malware would search the contents of text messages for keywords of “geopolitical interest to Chinese intelligence collection.” It would also search for specific phone numbers of certain people from a database that the hackers had and were targeting.

Tags:
owen
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 0 )

No questions available

Related News in China-backed hackers stole text messages and phone records in push for intelligence

Related News in China-backed hackers stole text messages and phone records in push for intelligence

PHP7 bugs used by hackers to remotely hijack web servers
PHP7 bugs used by hackers to remotely hijack web servers
Nov 5, 2019
WhatsApp and Telegram Security Flaw Can Make Hackers to Manipulate Media Files
WhatsApp and Telegram Security Flaw Can Make Hackers to Manipulate Media Files
Jul 19, 2019
OceanLotus Infused Cobalt Strike to BMW and Hyundai to Control the System
OceanLotus Infused Cobalt Strike to BMW and Hyundai to Control the System
Dec 11, 2019
Supermicro Servers with USBAnywhere Vulnerabilities Could Allow Hackers to Exploit Them Remotely
Supermicro Servers with USBAnywhere Vulnerabilities Could Allow Hackers to Exploit Them Remotely
Sep 11, 2019
Hackers exploit Mozilla Firefox bug reportedly affecting Coinbase users
Hackers exploit Mozilla Firefox bug reportedly affecting Coinbase users
Jun 26, 2019
Data typed on a laptop can be eavesdropped by hackers via smartphones
Data typed on a laptop can be eavesdropped by hackers via smartphones
Aug 27, 2019
The Middle East faces the complication of being hacked by the ViceLeaker campaign
The Middle East faces the complication of being hacked by the ViceLeaker campaign
Jul 10, 2019
Actions by malicious actors leads to the hacking of the websites of an Indian Education Institute
Actions by malicious actors leads to the hacking of the websites of an Indian Education Institute
Nov 1, 2019
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Isaiah ?
What is the use of SUID & SGID commands

How to set the special permissions to the files and folders using SUID and SGID commands...

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.