InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China
Technology

The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China

October 6, 2025 4 Min Read
Share
The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China
SHARE

A Chinese company named Beijing Electronics and Technology Applications Institute (BIETA) is highly rated as likely to be led by the Ministry of National Security (MSS).

This assessment comes from evidence that at least four BIETA staff members have a clear link to MSS officers and have or have a relationship with the University of International Relations, according to recorded futures. The names of the four individuals include Wu Sizhong, His Deccan, Your Xingang, and Zhou Linna.

“BIETA and its subsidiary, Beijing Sanxin Times Technology Co., Ltd. (CIII), research, development, import and sales technologies almost certainly sell and sell technologies that support intelligence, anti-intellectuality, military, and other missions related to China’s national development and security.

“Their activities include research methods for steganography that may support the deployment of secret communication (COVCOM) and malware. Forensic investigations and development and sales of anti-centric equipment, as well as acquisition of foreign technologies for steganography, network penetration testing, military communications and planning.”

According to information shared on its website, Bieta is a “research and development organization” specializing in research into communications technology, multimedia information processing technology, multimedia information security technology, computer and network technology applications, and special circuit development. It is said that it has existed in some form since 1983.

One of Bieta’s core focus areas concerns the use of steganography across several media, with CIII also being copyrighted for software related to secret communication tactics. CIII has also developed a variety of applications for uploading files to Baidu Cloud and OneDrive, and for communicating with friends, network simulation and penetration testing on websites, mobile apps, enterprise systems, servers, databases, cloud platforms, and Internet of Things devices.

See also  APT36 targets Indian government with Golang-based DeskRAT malware campaign

In November 2021, the company has worked on a tool called the Intelligent Discussion Android App and a mobile phone positioning system that can identify, monitor, monitor, position and block phones within large venues.

Other solutions advertised by CIII range from communication simulations to network function testing tools and programs called Datacrypt Hummingbird Online Storage Upload Software. That said, there is limited public information about how these programs have augmented MSS.

The Mastercard-owned company said both Bieta and CIII were “almost undoubtedly.”

“Bieta’s research is almost certainly used to create technology that enables the MSS mission. MSS may have the capacity to be made available to local security departments, departments and officers, from Bieta’s achievements.

The disclosure comes just over a month after a cybersecurity company discovers a Chinese agent and VPN service called a Chinese proxy (formerly Gacloud), which has been used in a cyber campaign that is allegedly organized by a North Korean threat actor known as Kimsky.

“It is unclear whether they purchased a subscription or otherwise obtained this particular Trojan deputy,” it said. “This highlights the broader risks of the APT proxy infrastructure that blends with commercial products.”

Share This Article
Twitter Copy Link
Previous Article Marathon takes another technical test, but you don't hear anything about it Marathon takes another technical test, but you don’t hear anything about it
Next Article The ACLU says Ice is illegally punishing immigrants at the infamous Louisiana Detention Center The ACLU says Ice is illegally punishing immigrants at the infamous Louisiana Detention Center

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Lighthouse Phishing Platform
Technology

Google sues China-based hackers behind $1 billion Lighthouse phishing platform

3 Min Read
X warns users with security keys to re-register by November 10 to avoid lockout
Technology

X warns users with security keys to re-register by November 10 to avoid lockout

2 Min Read
From Log4j to IIS, Chinese hackers turn legacy bugs into global spying tools
Technology

From Log4j to IIS, Chinese hackers turn legacy bugs into global spying tools

8 Min Read
ASD warns of ongoing BADCANDY attack exploiting Cisco IOS XE vulnerability
Technology

ASD warns of ongoing BADCANDY attack exploiting Cisco IOS XE vulnerability

3 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?