Chinese man charged with hacking into US fighter jet plans

P { margin-bottom: 0.08in; }

A Chinese businessman charged with
hacking computer systems of U.S. companies with defence contracts
remains in custody in Canada. US authorities have charged a Chinese
businessman with hacking into the computer systems of companies with
large defence contracts, including Boeing, to steal data on military
projects including some of the latest fighter jets, according to

Su Bin worked with two unnamed Chinese hackers to get the data
between 2009 and 2013, then attempted to sell some of the information
to state-owned Chinese companies, prosecutors said.

The three hackers targeted fighter jets such as the F-22 and the
F-35 as well as Boeing’s C-17 military cargo aircraft programme,
according to a criminal complaint filed in US district court in Los
Angeles that was unsealed on Thursday. An attorney for Su could not
be reached for comment.

U.S. Department of Justice spokesman
Marc Raimondi said the conspirators are alleged to have stolen data
related to military aircraft and weapons systems.

Accusations of hacking by China and
counterclaims of such activity by the U.S. government have strained
U.S.-Chinese relations. Chinese hacking has been a major theme of
U.S.-China discussions this week in Beijing, though both sides have
publicly steered clear of the controversy.


Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...