Feeds

Britain warns businesses of Chinese 'honey trap'

Sex, spies, and memory sticks

Choosing a cloud hosting partner with confidence

Britain's MI5 security service has accused the Chinese government of engaging in an unusually wide-ranging campaign to breach UK business computer networks, in some cases exploiting sexual relationships to pressure individuals to cooperate.

The so-called "honey trap" methods were aimed at business executives at trade shows and exhibitions and involved offers of "lavish hospitality and flattery," according to an article in The Sunday Times. The New York Times quickly confirmed the report. The effort also involved the giving of digital cameras and memory sticks designed to surreptitiously install malware on users' PCs.

The Sunday Times cited a 14-page document titled "The Threat from Chinese Espionage" that was prepared in 2008 by MI5's Center for the Protection of National Infrastructure. A "restricted" version of the document was distributed to hundreds of British financial institutions and businesses. It described attacks on British defense, energy, communications, and manufacturing companies. It specifically named the Chinese government as engaging in the honey trap campaigns.

"Chinese intelligence services have also been known to exploit vulnerabilities such as sexual relationships and illegal activities to pressurize individuals to cooperate with them," it stated. "Hotel rooms in major Chinese cities such as Beijing and Shanghai which have been frequented by foreigners are likely to be bugged. Hotel rooms have been searched while the occupants are out of the room."

The report, which was issued more than a year ago, followed an earlier MI5 letter distributed in late 2007 that warned some 300 leaders of British businesses to be on the lookout for state-sponsored Chinese hackers carrying out electronic surveillance attacks. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.