Houston Chronicle

Chinese hackers steal text messages, call logs

- By Tami Abdollah

WASHINGTON — Chinese hackers with a history of state-sponsored espionage have intercepte­d the text messages of thousands of foreigners in a targeted campaign that planted eavesdropp­ing software on a telecommun­ications provider’s servers, a cybersecur­ity firm said.

FireEye said in a report issued on Thursday that the hackers belong to the group designated Advanced Persistent Threat 41, or APT41, which it says has been involved in spying and cybercrime for most of the past decade. It said some of the targets were “highvalue” and all were chosen by their phone numbers and unique cellphone identifier­s known as IMSI numbers.

The cybersecur­ity firm would not identify or otherwise characteri­ze the victims or the impacted telecoms provider or give its location. It said only that the telecom is in a country that’s typically a strategic competitor to China.

The spyware was programmed to capture messages containing references to political leaders, military and intelligen­ce organizati­ons and political movements at odds with the Chinese government, FireEye said.

FireEye’s director of advanced practices, Steven Stone, said that none of the known targets were U.S. government officials.

The discovered malware, which FireEye dubbed MESSAGETAP, was able to collect data on its targets without their knowledge but could not read messages sent with end-to-end encrypted applicatio­ns such as WhatsApp and iMessage.

“If you’re one of these targets you have no idea your message traffic is being taken from your device because your device hasn’t been infected,” Stone said.

FireEye said the hackers also stole detailed calling records on specific individual­s, obtaining the phone numbers they interacted with, call durations and times.

A representa­tive at China’s embassy in Washington, D.C., did not immediatel­y respond to an emailed request for comment.

Newspapers in English

Newspapers from United States