{"id":2610,"date":"2018-06-11T15:02:18","date_gmt":"2018-06-11T15:02:18","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=132718"},"modified":"2018-06-11T15:02:18","modified_gmt":"2018-06-11T15:02:18","slug":"report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/","title":{"rendered":"Report: Chinese Hackers Siphon Off \u2018Massive\u2019 Amounts of Undersea Military Data"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<div><img decoding=\"async\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/11104158\/submarine.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Nation-state attackers affiliated with the Chinese government have made off with a trove of undersea military secrets, according to a report.<\/p>\n<p>Hackers were able to mount a lateral attack after compromising the networks of a Navy contractor working for the Naval Undersea Warfare Center in Rhode Island, according to a Washington Post <a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/china-hacked-a-navy-contractor-and-secured-a-trove-of-highly-sensitive-data-on-submarine-warfare\/2018\/06\/08\/6cc396fa-68e6-11e8-bea7-c8eb28bc52b1_story.html\" target=\"_blank\" rel=\"noopener\">report<\/a>, citing American officials.<\/p>\n<p>The result? \u201cMassive amounts of highly sensitive data\u201d flowed into the hands of China, unnamed officials told the paper, including \u201csecret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020.\u201d<\/p>\n<p>The incident happened January and February, the sources said, and resulted in 614 gigabytes of data, most of it highly sensitive info related to American offensive and defensive systems, including cryptography systems for secure communication, signals and sensor data, and the Navy\u2019s electronic submarine warfare library, which contains information about adversary radar platforms.<\/p>\n<p>Also among the stolen materials is information on a $300 million secret project codenamed <a href=\"https:\/\/www.popularmechanics.com\/military\/weapons\/a21248858\/navy-sea-dragon-chinese-hackers\/\" target=\"_blank\" rel=\"noopener\">Sea Dragon<\/a>. The Pentagon vaguely characterizes it as the development of \u201cdisruptive offensive capability\u201d by \u201cintegrating an existing weapon system with an existing Navy platform.\u201d It\u2019s been underway since 2015.<\/p>\n<p>The officials said that the Navy and the FBI are spearheading an investigation into the breach, but neither has publicly commented on the situation with any detail, beyond confirming that it happened. Sources also said that the civilian counterintelligence agency known as the Chinese Ministry of State Security was behind the attack.<\/p>\n<p>\u201cIn the first half of 2018, we\u2019ve seen several Chinese cyber espionage groups re-emerge from apparent hiatuses, possibly due to diminished public attention or completion of a bureaucratic reorganization which may have led to a centralization of cyber operations from China,\u201d Cristiana Brafman Kittner, principal analyst at FireEye, told Threatpost. \u201cMoreover, some of our observations suggest that China is increasing the scope and scale of campaigns and showing an increased focus on maritime interests with <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2018\/03\/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.html\" target=\"_blank\" rel=\"noopener\">multiple clusters<\/a> of Chinese APTs targeting entities associated with maritime defense and research initiatives.\u201d<\/p>\n<p><strong>Insecure Contractor<\/strong><\/p>\n<p>As for what went wrong, it comes down to basic security hygiene: The data, despite comprising what can be seen as classified military secrets, was housed on the contractor\u2019s unclassified network, sources said.<\/p>\n<p>\u201cWe saw a similar attack when the Dragonfly group gained direct access to the US power grid through a vulnerable third party,\u201d said Fred Kneip, CEO at CyberGRX, via email. \u201cIt\u2019s an effective approach because large organizations have thousands of contractors, vendors and suppliers that they interact with \u2013 and any one of them could be the way in. Learning which third parties pose the greatest risk to your network doesn\u2019t have to be like finding a needle in a haystack, but that\u2019s the way it works too often. The same methods hackers are using to access classified military information are being used every day to access commercial assets \u2013 and the only way to prevent it is through a more collaborative approach to understanding risk exposure.\u201d<\/p>\n<p>Defense Secretary Jim Mattis meanwhile asked the Pentagon inspector general\u2019s office on Friday to review contractor cybersecurity practices, the Post reported.<\/p>\n<p>The attack falls in line with China\u2019s ongoing efforts to develop advanced weapons capability, often on the back of <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2013-05-01\/china-cyberspies-outwit-u-s-stealing-military-secrets\" target=\"_blank\" rel=\"noopener\">stolen<\/a> mechanical and software systems plans. In February, Director of National Intelligence Daniel Coats <a href=\"https:\/\/www.dni.gov\/files\/documents\/Newsroom\/Testimonies\/2018-ATA---Unclassified-SSCI.pdf\" target=\"_blank\" rel=\"noopener\">testified<\/a> that Chinese cyber-spying efforts have mainly focused on infiltrating defense contractors and other third parties before pivoting to government networks, both here in the U.S. and abroad (as <a href=\"https:\/\/threatpost.com\/china-linked-apt15-used-myriad-of-new-tools-to-hack-uk-government-contractor\/130376\/\" target=\"_blank\" rel=\"noopener\">a recent incident<\/a> in the U.K. demonstrates).<\/p>\n<p>At the same time, China has been signing anti-hacking pacts regarding commercial sectors: In September 2015, Chinese President Xi Jinping inked a pledge with former President Barack Obama that China would refrain from cyberespionage against private-sector companies in the United States. That deal was <a href=\"https:\/\/www.justice.gov\/opa\/pr\/first-us-china-law-enforcement-and-cybersecurity-dialogue\" target=\"_blank\" rel=\"noopener\">reaffirmed<\/a> last fall, although researchers say there\u2019s provisional evidence that attacks are continuing, most notably in the 2017 <a href=\"https:\/\/threatpost.com\/inside-the-ccleaner-backdoor-attack\/128283\/\" target=\"_blank\" rel=\"noopener\">CCleaner attacks<\/a>. Nonetheless, a <a href=\"https:\/\/pm.gc.ca\/eng\/news\/2017\/06\/22\/joint-communique-2nd-canada-china-high-level-national-security-and-rule-law-dialogue\" target=\"_blank\" rel=\"noopener\">similar deal<\/a> was signed by Canadian Prime Minister Justin Trudeau and Chinese Premier Li Keqiang last year, and China and Russia also have also had <a href=\"http:\/\/thehill.com\/policy\/cybersecurity\/241453-russia-china-unit-with-major-cyber-pact\" target=\"_blank\" rel=\"noopener\">a deal in place<\/a> since 2015.<\/p>\n<p>In addition to the data exfiltration.\u00a0Martin McKeay, global security advocate at Akamai, noted that this might only be part of the hackers\u2019 end game.<\/p>\n<p>\u201cGathering data on your enemy is only half of information warfare; spreading false and misleading information is the other,\u201d he told Threatpost. \u201cAny time an organization reports a breach by this level of adversary, the stolen data is only part of the problem. Any adversary who has the access required to steal this data is likely to also have the ability to modify existing plans and software to introduce errors or even potentially back doors for future compromises in the finished product. Every image and line of code that makes up the plans the contractor is using have to be examined in detail to guarantee no modifications have been made, a costly and time consuming process.\u201d<\/p>\n<p><em>Image courtesy of the U.S. Navy.<\/em><\/p>\n<p>READ MORE <a href=\"https:\/\/threatpost.com\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/132718\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The stolen data included &#8220;secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020,&#8221; American officials said. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":2611,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[154,125,17,1194,211,126,224,18,1197,1198,1199,1200,1201,1202],"class_list":["post-2610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-china","tag-critical-infrastructure","tag-cryptography","tag-espionage","tag-featured","tag-government","tag-hackers","tag-hacks","tag-military-contractor","tag-military-secrets","tag-navy","tag-sea-dragon","tag-submarines","tag-undersea"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Report: Chinese Hackers Siphon Off \u2018Massive\u2019 Amounts of Undersea Military Data 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Report: Chinese Hackers Siphon Off \u2018Massive\u2019 Amounts of Undersea Military Data 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-11T15:02:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data.png\" \/>\n\t<meta property=\"og:image:width\" content=\"980\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Report: Chinese Hackers Siphon Off \u2018Massive\u2019 Amounts of Undersea Military Data\",\"datePublished\":\"2018-06-11T15:02:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\\\/\"},\"wordCount\":843,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data.png\",\"keywords\":[\"China\",\"Critical Infrastructure\",\"Cryptography\",\"espionage\",\"Featured\",\"Government\",\"Hackers\",\"Hacks\",\"military contractor\",\"military secrets\",\"navy\",\"sea dragon\",\"submarines\",\"undersea\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\\\/\",\"name\":\"Report: Chinese Hackers Siphon Off \u2018Massive\u2019 Amounts of Undersea Military Data 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data.png\",\"datePublished\":\"2018-06-11T15:02:18+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data.png\",\"width\":980,\"height\":483},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"China\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/china\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Report: Chinese Hackers Siphon Off \u2018Massive\u2019 Amounts of Undersea Military Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Report: Chinese Hackers Siphon Off \u2018Massive\u2019 Amounts of Undersea Military Data 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/","og_locale":"en_US","og_type":"article","og_title":"Report: Chinese Hackers Siphon Off \u2018Massive\u2019 Amounts of Undersea Military Data 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-11T15:02:18+00:00","og_image":[{"width":980,"height":483,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Report: Chinese Hackers Siphon Off \u2018Massive\u2019 Amounts of Undersea Military Data","datePublished":"2018-06-11T15:02:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/"},"wordCount":843,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data.png","keywords":["China","Critical Infrastructure","Cryptography","espionage","Featured","Government","Hackers","Hacks","military contractor","military secrets","navy","sea dragon","submarines","undersea"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/","url":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/","name":"Report: Chinese Hackers Siphon Off \u2018Massive\u2019 Amounts of Undersea Military Data 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data.png","datePublished":"2018-06-11T15:02:18+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data.png","width":980,"height":483},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/report-chinese-hackers-siphon-off-massive-amounts-of-undersea-military-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"China","item":"https:\/\/www.threatshub.org\/blog\/tag\/china\/"},{"@type":"ListItem","position":3,"name":"Report: Chinese Hackers Siphon Off \u2018Massive\u2019 Amounts of Undersea Military Data"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=2610"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2610\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/2611"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=2610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=2610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=2610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}