Sign up for our daily briefing
Make your busy days simpler with Axios AM/PM. Catch up on what's new and why it matters in just 5 minutes.
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Denver news in your inbox
Catch up on the most important stories affecting your hometown with Axios Denver
Des Moines news in your inbox
Catch up on the most important stories affecting your hometown with Axios Des Moines
Minneapolis-St. Paul news in your inbox
Catch up on the most important stories affecting your hometown with Axios Twin Cities
Tampa Bay news in your inbox
Catch up on the most important stories affecting your hometown with Axios Tampa Bay
Charlotte news in your inbox
Catch up on the most important stories affecting your hometown with Axios Charlotte
An image of China's President Xi Jinping is seen on an exhibition. Photo: AFP / Getty Images
Researchers at FireEye announced Friday that they've seen an influx of what are believed to be Chinese spies hacking computer systems at U.S. engineering and maritime firms, particularly those with interests in the South China Sea.
Why it matters: Most spying is just that — spying. This does not mean that China is trying to sabotage the U.S. maritime industry. It does, however, offer a glimpse of what Beijing's intelligence priorities are.
The details: FireEye linked the breaches to a Chinese espionage group known alternately as Periscope or Leviathan, which has been active since at least 2013 and has focused on maritime industries including shipping and engineering.
- The link to China appears to be based on the use of hacking tools that are traditionally used in Chinese attacks as well as similarities in how the attackers communicate with malware implanted in target servers.