Chinese hackers posed as Iranians to breach Israeli targets, FireEye says

Suspected Chinese spies masqueraded as Iranian hackers in a two-year campaign to break into government and telecommunication networks in Israel, security firm FireEye said Tuesday.
The alleged Chinese intruders used a hacking tool previously associated with Iranian operatives, and embedded some of their malicious code with Farsi, the predominant language in Iran. It was part of a broader campaign to gather intelligence at organizations in other Middle East and Central Asian countries that has continued this year, according to FireEye.
The findings show how spies plant digital evidence in an effort to throw off investigators in the high-stakes world of espionage. The revelations come amid a period of heightened scrutiny of Chinese cyber activity: The U.S. and its European allies in Julycondemned China’s alleged exploitation of Microsoft software and said that it enabled ransomware attacks.
John Hultquist, vice president of threat intelligence at Mandiant FireEye, said the targeting at Israeli organizations and elsewhere has “consistent with previous Chinese government activity.” FireEye has not pinpointed which Chinese government entity may have sponsored the espionage, Hultquist added.
“It’s a good reminder there may come a day when these things fool us,” he said of digital false-flag efforts. “We have to be careful not to be myopic and focus on the incidents that are just happening in our backyard, because we miss opportunities to see the use of new tactics.”
FireEye did not identify the victims of the hacking, saying only that there were “multiple, concurrent operations against Israeli government institutions, IT providers and telecommunications entities beginning in January 2019.”
One of the most famous false-flag efforts came when, according to U.S. officials and private analysts, Russia’s GRU military intelligence agencyposed as North Korean hackers to disrupt some IT services during the 2018 Olympics in South Korea.
As in that incident, the alleged Chinese hackers tracked by FireEye chose to frame a likely suspect for their activity. Israel and Iran haverepeatedly blamed each other for cyberattacks on their critical infrastructure.
Sino-Iranian cyber activity isn’t unheard of, either. In December 2019, Iran’s minister of information, communications and technologyblamed APT 27 — a suspected Chinese government-linked group — for a “cyberattack” on Iranian government networks. FireEye said Tuesday that the group responsible for the intrusions in Israel and other Middle East and Central Asian countries has links with APT 27.
In response to the FireEye research, Liu Pengyu, spokesperson for the Chinese Embassy in Washington, D.C., claimed that the “U.S. is the world’s largest source of cyber attacks and attacks targeting China.”
“Given the virtual nature of cyberspace and the fact that there are all kinds of online actors who are difficult to trace, it’s important to have enough evidence when investigating and identifying cyber-related incidents,” Liu said.
FireEye said it investigated the breaches with Israeli defense agencies. A spokesperson for the Israeli Ministry of Defense referred a request for comment to Israel’s National Cyber Directorate, which did not respond.
More Like This
Top Stories
More Scoops

Iranian hackers using social media, job recruitment sites to lure Israeli spies

Microsoft says Iranian hackers combine influence ops with hacking for maximum impact

Trellix, McAfee, FireEye, Mandiant: What’s next for four big names in cyber
Iranian government-backed hackers target critical infrastructure with ransomware, US says
State-sponsored Iranian hackers uploaded fake VPN app to Google’s Play store, posed as university officials
Suspected Chinese hackers masqueraded as Indian government to send COVID-19 phishing emails
Pulse Secure VPN hacking also hit transportation, telecom firms, FireEye says
Latest Podcasts
Government
Technology
Threats
Policy
- Top Senate Intel Dem warns of ‘catastrophic’ cyber consequences of Trump admin national security firings, politicization
- Why Anna Gomez believes the FCC is letting telecoms off easy after Salt Typhoon
- Information sharing law’s expiration could squander government vulnerability hunting efforts, senator says
- Dozens of groups call for governments to protect encryption