Tumgik
#TechSurveillance
osintelligence ยท 4 months
Link
https://bit.ly/3wllrV3 - ๐Ÿ” A recent leak on GitHub has unveiled documents allegedly showcasing China's offensive cyber operations, developed by the Chinese infosec company I-Soon. These operations reportedly target social media, telecom companies, and other organizations globally, with suspicion pointing towards orchestration by the Chinese government. #CyberSecurity #GitHubLeak ๐ŸŒ The leaked documents, analyzed by Taiwanese threat intelligence researcher Azaka Sekai, offer a deep dive into China's state-sponsored cyber activities, including spyware features for obtaining users' Twitter details, real-time monitoring, and more, although no official confirmation of their authenticity has been made. #CyberEspionage #StateSponsored ๐Ÿ“ฑ According to the leak, the spyware targets Android and iOS devices, capable of gathering extensive sensitive data such as GPS locations, contacts, and real-time audio. Devices resembling portable batteries can inject spyware via WiFi, illustrating the sophisticated nature of these cyber tools. #DigitalPrivacy #Spyware ๐Ÿ”ง The documents detail various gadgets and software used in these operations, targeting users of Chinese social media platforms like Weibo, Baidu, and WeChat, and even extracting sensitive information from telecom providers in Kazakhstan. #TechSurveillance #SocialMediaSecurity ๐ŸŒ Victims identified in the documents include prestigious institutions and organizations such as Sciences Po in Paris, Apollo Hospitals in India, and government entities in China's neighboring countries, showcasing the broad scope of these cyber operations. #GlobalCyberThreats #DataBreach ๐Ÿ’ธ The leak also sheds light on the compensation of employees involved in developing the spyware, revealing an average salary of 7,600 RMB (about 1,000 USD) post-tax, highlighting the stark contrast between the employees' earnings and the gravity of their work.
0 notes