, 9 tweets, 3 min read
Chinese hackers planted spyware on unnamed telecommunication provider's servers and intercepted call records & text messages of "high value" targets.

zdnet.com/article/chines…
The spyware, called MessageTap, was planted on the company's SMSC servers and monitored the texts for particular keywords, such as words related to political, military, and intelligence targets.
Ahh, they also monitored for keywords of political movements. We all know that would be #HongKong.

They also filtered texts based on particular phone numbers and particular device identifiers.
The hackers also sifted through the phone provider's phone meta data database looking for calls to/from high-ranking officials that would be of interest to Chinese intelligence.

The spyware is also related to #China's spying/tracking of Uyghurs.
Here's another report from June 2019 detailing how Chinese hackers were targeting telecommunications companies.

cybereason.com/blog/operation…
They believe the hackers broke into at least 10 telcos to steal phone call data and geolocations. The hackers set up their own VPN and at least 10 accounts with administrator privileges.

zdnet.com/article/these-…
They reportedly identified targets in Asia, the Middle East, Africa, and Europe and 20 very specific targets were identified, though not named publicly.
Is that why so many of those countries are keeping Huawei in their networks? 🧐
In regards to MessageTap malware in particular, this article states that 4 telcos and 4 separate cell phone service providers had their networks injected with MessageTap.

thenextweb.com/security/2019/…
Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with MissMAGA2016

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!