China impersonation hack in Israel: A column misunderstood as Iran exposed | China | technology | Hack | Defense News | malayalam technology news


A cyber attack by Chinese hackers on the servers of the Israeli government, private technology companies and telecom companies. The hack occurred between 2019-2020, according to an MIT Technology review. Then, Israeli cyber investigation agencies launched a robust investigation. Investigating agencies initially concluded that its archenemy, Iran, was behind the attack. Symbols written in Iranian Persian language reinforced this suspicion. The attack also had the usual methods of Iranian hackers.

But the agencies were not satisfied with this finding and continued with further investigations. They did more research on cyber espionage in the Middle East. As the investigation progressed, the Israeli authorities became convinced that Iran was not behind the attack. The real culprit cell appeared. It was only China.
The hacking operation was carried out by a fake Chinese hacker group from the Iranian capital, Tehran. The hack was first discovered and reported to Israel by US cybersecurity firm FireI. The goal was to secretly monitor Israeli institutions after they had been infiltrated. The impersonation was intended as a distraction if it was ever caught. They deliberately used file paths containing the word Iran.

A Chinese hacking group known as UNC215 has been identified as the mastermind behind the hack. There is a common pattern of cyber attacks by Chinese hackers in the Middle East. They also continued this practice. This similarity with hacking was the main reason for their capture. UNC215 is already notorious in the Middle East. Hacking was carried out in many places and its methods are known to the electronic intelligence agencies of many countries, including Israel.

See also  Alienware's Stunning Curved Gaming Monitor costs $ 350 on Prime Day

This is the first time that China has carried out such a massive hacking operation against Israel. This is at a time when China is trying to establish better relations with Israel. Chinese companies have invested billions of dollars in Israel as part of Chinese President Xi Jinping’s dream project, the Belt and Road Initiative.

A similar impersonation hack has occurred before. During the 2018 Winter Olympics in South Korea, a virus called Olympic Terminator entered servers used to control the Olympic opening ceremonies. The attack was carried out by North Korean hackers. But the attack was actually carried out by Russian intelligence agencies.

English summary: Chinese hackers disguised as Iran to target Israel

var fbAppId =$("meta[property='fb:app_id']").attr("content"); var jsonData; var albums1;


loadImgShare: function () { ART_SLIDESHOW.fbPluginCall(); ART_SLIDESHOW.callShareJS(); },

callShareJS: function () {

var link = ART_SLIDESHOW.getLocation(window.location.href); var protocol = link.protocol; var hostname = link.hostname;


$('.fb').unbind().click(function (e) { var FBTitle = $(this).children().data("imgtitle"); var FBDesc = $(this).children().data("imgdesc"); var FBlink = window.location.href.split('.html')[0]+'.html'+window.location.hash;

var props = { method: 'share_open_graph', action_type: 'og.shares', action_properties: JSON.stringify({ object: { 'og:url': FBlink, 'og:title': FBTitle, 'og:description': FBDesc, 'og:image': protocol + "//" + hostname + imgSRC } }) }

function fbcallback(response) { if (responsepost_id) self.close(); } FB.ui(props, fbcallback); return false; e.stopPropagation(); });

$('.close').unbind().click(function () { $('.share').fadeOut('fast'); click_txt = 0; });


getLocation: function (href) { var location = document.createElement("a"); location.href = href; if ( == "") { location.href = location.href; } return location; },

fbPluginCall: function () { try { (function (d, s, id) { // Disabling this external JS in edit/author mode if (typeof CQ != "undefined") { if (CQ.WCM) { if (CQ.WCM.isEditMode(true)) { return; } } }

var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); = id; js.src = "" + fbAppId; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk'));

FB.init({ appId: fbAppId, version: 'v2.9', status: true, cookie: true }); } catch (err) {} }


Leave a Reply

Your email address will not be published.