Hackers spoofed Huawei website to steal 5G information

McAfee uncovers phishing campaign that may have been motivated by the ban of Chinese technology in the global 5G rollout

Cyber criminals are using a phishing website disguised as the Huawei company career page in order to target people working in the telecommunications industry, according to new research by security software provider McAfee.

Dubbed 'Operation Diànxùn' by the company’s Advanced Threat Research (ATR) Strategic Intelligence team, the campaign is aimed at spying on telecommunication companies based in Southeast Asia, Europe, and the US, with an emphasis on German, Vietnamese and Indian businesses.

McAfee’s researchers have a “moderate level of confidence” that the phishing campaign, which focused on stealing sensitive or secret information related to 5G technology, could have been motivated by the ban of Chinese equipment in the global 5G rollout. 

For instance, UK telecoms providers have been banned from purchasing new equipment from 31 December 2020 as well as installing Huawei equipment in the country's 5G networks from September 2021. Meanwhile, the latest reports reveal that the Biden administration is set to continue with tough restrictions on Chinese tech firms by ushering in a Trump-era rule on technology purchases and deals.

However, despite the cyber criminals opting to use Huawei’s career site as a model for their phishing website, McAfee’s team emphasised that they didn’t find evidence to suggest that Huawei was knowingly involved in Operation Diànxùn.

Detailing their findings, researchers Thomas Roccia, Thibault Seret, and John Fokker said that they had “discovered malware that masqueraded as Flash applications, often connecting to the domain "hxxp://update.careerhuawei.net" that was under the control of the threat actor.

“The malicious domain was crafted to look like the legitimate career site for the technology company Huawei, which has the domain; career.huawei.com. In December we also observed a new domain name used in this campaign: hxxp://update.huaweiyuncdn.com.

"Moreover, the sample masquerading as the Flash application used the malicious domain name "hxxp://flach.cn" which was made to look like the official web page for China to download the Flash application, flash.cn,” they added.

McAfee also managed to identify that the campaign involved the use of a Cobalt Strike backdoor, which last week was found to be responsible for targeting 650 Exchange servers, some of which were UK-based, according to ESET.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget
Mobile Phones

Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget

13 Apr 2021
NSA uncovers new "critical" flaws in Microsoft Exchange Server
servers

NSA uncovers new "critical" flaws in Microsoft Exchange Server

14 Apr 2021