A hacker group linked to Chinese espionage is illicitly installing software at telecommunications companies to steal text messages from specific users and regarding specific topics, according to cybersecurity firm FireEye.
The big picture: While Chinese espionage is often linked to intellectual property theft, the targets in this case appear to be more linked to traditional espionage, including senior political and military figures and topics that could be of interest to Chinese policymakers.
The backdrop: The hacking group identified in this campaign, known as APT 41, is believed to have been active for nearly a decade.
- They are interesting among Chinese spy groups because they appear to both spy for the government and commit cybercrime on the side to supplement their own incomes.
The big picture: FireEye has discovered "multiple" telecoms infected with the newly discovered malware, which they have dubbed Messagetap, Steven Stone, the firm's director of advanced practices, told Axios.
- It assumes that many more will soon be discovered.
- "We're at the front end of this discovery," he said, noting that the company decided publishing a speedy warning was more important than taking time to assess the campaign's scope. "I'd be really surprised if they just used this against one nation."
What's happening: Messagetap installs onto telecommunication company-specific hardware.
- While APT 41 and other spy groups have hacked telecoms in the past to search for information on individuals, weeding out targets is usually done one at a time. This software automates the process, allowing spies to search for thousands of identifiers at the same time.
- FireEye told Axios that the software they discovered was searching for text messages to or from at least 7,000 different phone numbers or individual phone identifiers, known as IMSI numbers.