[ad_1]
(LOS ANGELES) – Chinese intelligence officers and hackers have been working on commercial jet engines, Federal Prosecutors said Tuesday.
The indictments named two officers working for the Nanjing-based foreign intelligence arm of China's Ministry of State Security and six other defendants who allegedly conspired from 2010 to 2015 to steal sensitive turbofan engine technology used in commercial aviation.
The hackers used spear phishing to deploy malware and other means to intrude into a French aerospace company that was developing the engines with a U.S. company, prosecutors said. The suspects also hacked into aerospace companies in Massachusetts, Oregon, and Arizona that manufactured engine parts.
A Chinese state-owned aerospace company was working at the time to develop a similar type of engine for use in commercial aircraft.
"This action is yet another example of criminal efforts by the Ministry of State Security," said US Attorney Adam Braverman in a statement. "The concerted effort to steal, rather than simply purchase, to be commercially available products that should be invests every talent, energy, and shareholder money into the development of products."
The Courts of Justice of the United States of America and the United States of America.
In 2014, for instance, the department announced an indictment against a five-member military officer of the United States of America.
Earlier this month, an accused Chinese spy, was charged with stealing several secrets from the United States of America and the United States. United States for trial.
None of the eight defendants named in the indictment unsealed Tuesday in San Diego federal court were in custody and the US does not have an extradition treaty with China.
Prosecutors said the hackers had tried to infiltrate 13 companies, including two aerospace based in the United Kingdom.
The name of the company being targeted, saying the first alleged hack in January 2010 aims at stealing data from the Los Angeles-based Capstone Turbine, a gas turbine manufacturer.
Source link