Chinese engineer stole US military and NASA software for years
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户已经提供了文章的英文内容,我先快速浏览一下。 这篇文章讲的是一个叫Song Wu的中国航空航天工程师,他通过伪装成美国研究人员,发送邮件请求源代码和专有软件,持续了四年。受害者包括NASA、美军和大学的研究人员,可能违反了美国法律。Wu被FBI指控多项罪名,目前仍然在逃。 接下来,我需要将这些信息浓缩到100字以内。要抓住主要人物、行为、影响和结果。比如:Song Wu的身份、他的行为方式、目标对象、后果以及他的现状。 可能会用到的关键词:伪装、研究人员、请求软件、四年、NASA、美军、大学、违反法律、FBI指控、在逃。 现在把这些整合成一句话或几句话,确保流畅且信息完整。 例如:“一名中国航空航天工程师Song Wu通过伪装成美国研究人员请求源代码和专有软件,持续四年从NASA等机构获取机密信息。受害者可能违反美国法律,Wu被FBI指控多项罪名,目前仍在逃。” 检查字数是否在100字以内,并确保没有使用“文章内容总结”等开头词。 </think> 一名中国航空航天工程师Song Wu通过伪装成美国研究人员请求源代码和专有软件,持续四年从NASA等机构获取机密信息。受害者可能违反美国法律,Wu被FBI指控多项罪名,目前仍在逃。 2026-4-28 09:21:11 Author: www.malwarebytes.com(查看原文) 阅读量:11 收藏

International espionage isn’t always about sophisticated malware and zero-day bugs. Sometimes it’s as simple as pretending to be someone else asking for a favor.

For four years, a Chinese aerospace engineer did just that. Dozens of researchers at NASA, the US military, and major universities handed him exactly what he asked for, and possibly violated US laws in the process.

His name is Song Wu. He’s been on the FBI’s wanted list since September 2024, charged with 14 counts of wire fraud and 14 counts of aggravated identity theft, and he’s still at large.

Wu’s day job was as an engineer at the Aviation Industry Corporation of China (AVIC), a Beijing-headquartered state-owned aerospace and defense conglomerate with over 400,000 employees. The US has AVIC and several subsidiaries on a sanctions list.

His side hustle was simpler. From January 2017 through December 2021, Wu set up email accounts impersonating real US researchers and engineers, then emailed their colleagues asking for source code and proprietary software. He targeted employees at NASA, the Air Force, Navy, Army, and FAA, and faculty at universities across the US.

When software is a weapon

The applications Wu was after handle aerospace engineering and computational fluid dynamics. It’s the kind of intellectual property that helps develop advanced tactical missiles and evaluate weapons performance, and it sits squarely inside US export controls, according to NASA’s Office of the Inspector General. Sharing it with the wrong person, even by accident, is a federal problem.

Some victims did transmit the requested code. They were, in the OIG’s careful phrasing, “unwittingly” violating export control law.

How a four-year campaign finally broke

It wasn’t a firewall that caught Wu. It was a tip.

NASA’s Cyber Crimes Division got a report that someone had set up a Gmail account claiming to be an established aerospace professor who frequently collaborated with NASA. From that single thread, investigators unwound a campaign that had quietly targeted dozens of researchers across the federal government and academia.

The OIG also noted the giveaways: Wu asked for the same software multiple times and never explained why he needed it. Those are tells that anyone could have spotted on a slow afternoon if they’d been looking.

What’s coming next

Wu’s campaign worked for four years using nothing more sophisticated than fake email accounts and decent target research. He’s one engineer, but the problem is far bigger than him.

Then-FBI Director Christopher Wray told the House Select Committee in 2024 that:

“the PRC has a bigger hacking program than every other major nation combined.”

Chinese hackers would still outnumber FBI cyber personnel 50 to 1 even if every US cyber agent worked nothing else, he said.

Social engineering continues to be a problem, and impersonators are getting more convincing thanks to the use of deepfake technology. Online criminals are using voice cloning and even deepfake video to infiltrate their targets by posing as job interviewees. And others are flipping the script, posting as recruiters on LinkedIn to fool would-be job candidates into downloading malware.

Spear-phishing was problem enough when it was one guy in Beijing with a Gmail account. It’s going to become a much bigger problem when the next Wu uses generative AI to draft the emails, clones a real researcher’s writing voice, and runs the playbook at machine speed across a thousand inboxes.


Browse like no one’s watching. 

Malwarebytes Privacy VPN encrypts your connection and never logs what you do, so the next story you read doesn’t have to feel personal. Try it free → 

About the author

Danny Bradbury has been a journalist specialising in technology since 1989 and a freelance writer since 1994. He covers a broad variety of technology issues for audiences ranging from consumers through to software developers and CIOs. He also ghostwrites articles for many C-suite business executives in the technology sector. He hails from the UK but now lives in Western Canada.


文章来源: https://www.malwarebytes.com/blog/news/2026/04/chinese-engineer-stole-us-military-and-nasa-software-for-years
如有侵权请联系:admin#unsafe.sh