NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章内容和一个示例的总结,所以我得先仔细阅读文章,理解其主要内容。 文章讲的是NASA的监察长办公室揭露了一起网络钓鱼事件。一个叫宋武的中国人冒充美国工程师,从NASA和其他机构获取敏感信息,违反了出口管制法。他从2017年到2021年进行了多年的诈骗活动,受害者包括政府机构、大学和私营公司的员工。宋武是中航工业的工程师,试图获取用于航空航天设计和武器开发的建模软件。他通过伪装成朋友和同事来获取这些信息。目前宋武被起诉,面临最高20年的监禁,并且仍然在逃。 接下来,我需要将这些关键点浓缩到100字以内。首先,指出事件:NASA员工被冒充的美国工程师欺骗。然后说明目的:获取敏感技术用于军事应用。接着提到涉及的时间范围和受害者类型:从2017年到2021年,涉及政府、大学和公司。最后提到后果:违反出口管制法,导致技术外流。 现在组合这些信息,确保语言简洁明了,并且不使用任何开头如“这篇文章总结了...”。检查字数是否在限制内。 </think> NASA员工被冒充的美国工程师欺骗,获取敏感技术用于军事应用。该事件涉及从2017年至2021年的网络钓鱼活动,受害者包括政府机构、大学及私营公司员工。此行为违反了出口管制法,导致技术外流至中国相关企业。 2026-4-24 14:13:0 Author: thehackernews.com(查看原文) 阅读量:15 收藏

Espionage / National Security,

The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese national posed as a U.S. researcher as part of a spear-phishing campaign to obtain sensitive information from the space agency, as well as from government entities, universities, and private companies, in violation of export control laws.

"For years, NASA employees and research collaborators thought they were simply sharing software with colleagues," the OIG said in a Thursday release. "Instead, they were emailing sensitive defense technology to a Chinese national who was impersonating U.S. engineers."

The individual linked to the campaign was outed as Chinese national Song Wu in September 2024, when the U.S. Department of Justice (DoJ) announced charges against him for orchestrating a multi-year campaign that stretched from January 2017 to December 2021 and involved targeting dozens of U.S. professors, researchers, and engineers.

Some of the victims of the campaign were employed at NASA, the Air Force, the Navy, the Army, and the Federal Aviation Administration, while the others worked at major universities and private sector firms.

According to the 2024 indictment, Song was an engineer at the Aviation Industry Corporation of China (AVIC), a Chinese state-owned aerospace and defense conglomerate founded in 2008. In an attempt to obtain modeling software used for aerospace design and weapons development, Song and his co-conspirators are alleged to have conducted extensive research on their targets by masquerading as friends and colleagues to gain access to proprietary software and source code.

The OIG said the scheme was successful in a handful of cases where victims shared the sensitive information with the imposter accounts managed by Song et al without realizing they were violating U.S. export control laws.

Song has been indicted on counts of wire fraud and 14 counts of aggravated identity theft, and faces a maximum sentence of 20 years in prison for each count of wire fraud. He also faces a two-year consecutive sentence if convicted of aggravated identity theft. The 40-year-old remains at large.

Adding Song to the U.S. Most Wanted List, the U.S. Federal Bureau of Investigation (FBI) said the specialized software could be used for industrial and military applications, including the development of advanced tactical missiles and aerodynamic design and assessment of weapons.

"As phishing campaigns continue to become more sophisticated, there are common clues that can betray scammers and expose their export fraud schemes," the OIG said. "In Song's case, he made multiple requests for the same software and did not justify why he needed it."

"Export control scammers also often suggest unusual payment methods (such as suspicious wire transfers); abruptly change the terms or source of payment; and use unconventional transfer methods to mask their identity and evade shipping restrictions."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/nasa-employees-duped-in-chinese.html
如有侵权请联系:admin#unsafe.sh