China implicates Chinese impersonation in Israel – does not understand a column China exposes China | Technology | Hack | Defense News | Malayalam Technology News

Chinese hackers cyber attack on Israeli government employees, private technology companies and telecom companies. According to MIT Technology Assessment, the hacking took place between 2019-2020. Israeli cybersecurity agencies then launched a vigorous investigation. Investigative agencies have initially concluded that Iran was behind the attack. Signs in Persian have reinforced this suspicion. The attack was also a tactic used by Iranian hackers.

However, the agencies were not satisfied with this finding and continued investigations. They have done more research on cyber espionage in the Middle East. As the investigation progressed, Israeli officials confirmed that Iran was not behind the attack. The real culprit appeared. There was only China.
The abduction was carried out by a fake Chinese hacker group from the Iranian capital, Tehran. The hijacking was first discovered by US cyber security company FireI. The goal was to sneak into Israeli institutions. If the impersonator had been arrested, it would have been considered a distraction. They deliberately used file paths containing the word Iran.

The Chinese hacking group, UNC215, has been identified as the mastermind behind the abduction. Cyber-attacks by Chinese hackers are common in the Middle East. They continue to do so. This was the main reason they were similar to hacking. UNC215 is already popular in the Middle East. The hacking took place in several places, and the tactics are well-known in many countries, including Israel.

This is the first time China has carried out such a massive abduction of Israel. This is a time when China is trying to establish better relations with Israel. Chinese companies have invested billions of dollars in Israel as part of Belt and Road Inive TV’s Chinese President Xi Jinping Dream Project.

Similar hacking attacks have occurred in the past. During the 2018 Winter Olympics in South Korea, a virus called the Olympic Terminator entered the servers used to control the opening ceremonies. The attack was carried out by North Korean hackers. However, the attack was carried out by Russian intelligence.

English Summary: Chinese hackers are hiding in Iran to target Israel

var fbAppId = $ (“Meta[property=’fb:app_id’]”) .attr (” content “); var jsonData; var albums1;


loadImgShare: function () {ART_SLIDESHOW.fbPluginCall (); ART_SLIDESHOW.callShareJS (); },

callShareJS: Task () {

var link = ART_SLIDESHOW.getLocation (window.location.href); var protocol = link.protocol; var hostname = link.hostname;

$ (‘Share’). fadeIn (‘fast’);

$ (‘. fb’)) data (“imgdesc”); var FBlink = window.location.href.split (‘. html’)[0]html ‘+ window.location.hash;

var props = {method: ‘share_open_graph’, action_type: ‘og.shares’, action_properties: JSON.stringify ({object: {‘og: url’: FBlink, ‘og: title’: FBTitle, ‘og: description’) FBDesc, ‘og: image’: protocol + “//” + hostname + imgSRC}})}

Function fbcallback (response) {if (responsepost_id) self.close (); } FB.ui (supports, fbcallback); Return falsehood; e.stopPropagation (); });

$ (‘Close’)


getLocation: function (href) {var location = document.createElement (“a”); location.href = href; If ( == “”) {location.href = location.href; } Place of return; },

fbPluginCall: function () {try {(function (d, s, id)) {// Disable this external JS in edit / author mode (typeof CQ! = “unfined”) {if (CQ.WCM) {if (CQ .WCM.isEditMode (true) {Back;}}}

var js, fjs = d.getElementsByTagName (s)[0]; (d.getElementById (ID)) returned; js = d.createElement (s); = id; js.src = “” + fbAppId; fjs.parentNode.insertBefore (js, fjs); } (Document, ‘script’, ‘facebook-jssdk’));

FB.init ({appId: fbAppId, version ‘v2.9’, status-truth, cookie-truth}); } Catch (Error) {}}


Leave a Comment