InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China
Technology

The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China

October 6, 2025 4 Min Read
Share
The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China
SHARE

A Chinese company named Beijing Electronics and Technology Applications Institute (BIETA) is highly rated as likely to be led by the Ministry of National Security (MSS).

This assessment comes from evidence that at least four BIETA staff members have a clear link to MSS officers and have or have a relationship with the University of International Relations, according to recorded futures. The names of the four individuals include Wu Sizhong, His Deccan, Your Xingang, and Zhou Linna.

“BIETA and its subsidiary, Beijing Sanxin Times Technology Co., Ltd. (CIII), research, development, import and sales technologies almost certainly sell and sell technologies that support intelligence, anti-intellectuality, military, and other missions related to China’s national development and security.

“Their activities include research methods for steganography that may support the deployment of secret communication (COVCOM) and malware. Forensic investigations and development and sales of anti-centric equipment, as well as acquisition of foreign technologies for steganography, network penetration testing, military communications and planning.”

According to information shared on its website, Bieta is a “research and development organization” specializing in research into communications technology, multimedia information processing technology, multimedia information security technology, computer and network technology applications, and special circuit development. It is said that it has existed in some form since 1983.

One of Bieta’s core focus areas concerns the use of steganography across several media, with CIII also being copyrighted for software related to secret communication tactics. CIII has also developed a variety of applications for uploading files to Baidu Cloud and OneDrive, and for communicating with friends, network simulation and penetration testing on websites, mobile apps, enterprise systems, servers, databases, cloud platforms, and Internet of Things devices.

See also  New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves

In November 2021, the company has worked on a tool called the Intelligent Discussion Android App and a mobile phone positioning system that can identify, monitor, monitor, position and block phones within large venues.

Other solutions advertised by CIII range from communication simulations to network function testing tools and programs called Datacrypt Hummingbird Online Storage Upload Software. That said, there is limited public information about how these programs have augmented MSS.

The Mastercard-owned company said both Bieta and CIII were “almost undoubtedly.”

“Bieta’s research is almost certainly used to create technology that enables the MSS mission. MSS may have the capacity to be made available to local security departments, departments and officers, from Bieta’s achievements.

The disclosure comes just over a month after a cybersecurity company discovers a Chinese agent and VPN service called a Chinese proxy (formerly Gacloud), which has been used in a cyber campaign that is allegedly organized by a North Korean threat actor known as Kimsky.

“It is unclear whether they purchased a subscription or otherwise obtained this particular Trojan deputy,” it said. “This highlights the broader risks of the APT proxy infrastructure that blends with commercial products.”

Share This Article
Twitter Copy Link
Previous Article Marathon takes another technical test, but you don't hear anything about it Marathon takes another technical test, but you don’t hear anything about it
Next Article The ACLU says Ice is illegally punishing immigrants at the infamous Louisiana Detention Center The ACLU says Ice is illegally punishing immigrants at the infamous Louisiana Detention Center

Latest News

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025
North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

The North Korean threat actors behind the Contagious Interview campaign…

November 29, 2025

You Might Also Like

Samsung zero-click vulnerability exploited to deploy LANDFALL Android spyware via WhatsApp
Technology

Samsung zero-click vulnerability exploited to deploy LANDFALL Android spyware via WhatsApp

4 Min Read
Bloody Wolf expands Java-based NetSupport RAT attacks in Kyrgyzstan and Uzbekistan
Technology

Bloody Wolf expands Java-based NetSupport RAT attacks in Kyrgyzstan and Uzbekistan

3 Min Read
Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar
Technology

Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar

6 Min Read
Chaos mesh critical graphical defects enable takeover of RCE and Fruc Bernate clusters
Technology

Chaos mesh critical graphical defects enable takeover of RCE and Fruc Bernate clusters

3 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?