MI5: Chinese spies using LinkedIn to target UK lawmakers | Supply‑chain hacks hit Australian weapons programs | Danish election websites hit by pro-Russian DDoS campaign
Summary
MI5 has warned that Chinese intelligence operatives are using LinkedIn — often posing as headhunters — to recruit and cultivate UK lawmakers, parliamentary aides and policy experts. The warning, communicated to Commons and Lords leaders, named suspected recruiters and prompted official scrutiny and a Chinese denial.
Separately, cyber intrusions into Australian defence contractors have exposed files linked to major weapons programmes (including the $7bn Redback IFV, Hunter-class frigates and Collins-class submarines). Groups claiming responsibility include Cyber Toufan and J Group; one contractor, IKAD Engineering, was reportedly infiltrated for five months. ASIO has warned of state-backed targeting of the defence supply chain.
On the eve of local elections in Denmark, pro‑Russian group NoName057(16) launched DDoS attacks against multiple political-party and government websites. Officials said voting (manual in Denmark) was unaffected, but the incidents underscore persistent election‑era disruptions.
Key Points
- MI5 warns Chinese operatives are using LinkedIn as a vector to approach and cultivate UK MPs, aides and policy experts under the guise of recruitment.
- The LinkedIn activity has led to a formal alert to parliamentary leaders and renewed focus on foreign political interference.
- Australian defence supply‑chain hacks exposed project materials for major defence programmes; supply‑chain data, even if labelled ‘non‑sensitive’, can be strategically valuable.
- Groups claiming the Australian breaches include Cyber Toufan and J Group; one contractor was compromised for months, highlighting persistent access risks.
- NoName057(16) claimed DDoS hits on Danish party and government sites before local polls; services were briefly disrupted but voting continued unaffected.
- These incidents together illustrate converging threats: platform‑based recruitment, supply‑chain intrusions and election‑period cyber nuisance/attack activity.
Why should I read this?
Quick hit: if you care about who influences policy, how defence secrets leak and how elections get messy online — this is your short, sharp briefing. It ties together social‑media spying, supply‑chain compromises and election cyber‑nuisance into one clear picture of how adversaries operate today.
Context and relevance
The three items reinforce a broader trend: state and state‑linked actors are exploiting a mix of social platforms, contractor networks and low‑cost attack techniques to advance intelligence and political aims. For policy makers, security teams and political staff, the stories underline the need for stricter vetting of contacts on professional networks, stronger cyber hygiene across defence suppliers, and resilient online services around elections. These are not isolated incidents — they map onto global moves to protect sensitive supply chains and democratic processes.
Source
Source: https://aspicts.substack.com/p/mi5-chinese-spies-using-linkedin