Chinese Engineer Charged in Multi-Year Campaign to Steal U.S. Aerospace Software
AI-generated from multiple sources. Verify before acting on this reporting.
WASHINGTON — A Chinese national working for the Aviation Industry Corporation of China was charged Thursday in a multi-year cyber espionage campaign targeting NASA and other U.S. government entities to obtain sensitive defense software.
Song Wu, an engineer at AVIC, was accused of orchestrating a spear-phishing operation designed to impersonate a U.S. researcher. The scheme aimed to extract modeling software critical for aerospace design and weapons development, actions that violated U.S. export control laws.
Federal authorities announced the charges on April 24, 2026, detailing a coordinated effort that spanned several years. The operation involved Wu and co-conspirators who allegedly exploited email communications to gain unauthorized access to restricted data. The software targeted by the campaign is subject to strict export regulations due to its potential application in military technology.
The indictment alleges that Wu utilized the stolen software to advance China's aerospace and defense capabilities. By bypassing export controls, the operation sought to circumvent U.S. restrictions on the transfer of sensitive technology to foreign entities. The charges highlight the ongoing efforts by U.S. law enforcement to counter state-sponsored cyber theft targeting national security interests.
Wu is currently facing charges related to the conspiracy to commit computer intrusion and the unauthorized acquisition of defense articles. The case underscores the complexity of modern cyber espionage, where actors employ sophisticated social engineering tactics to infiltrate high-security networks. Investigators stated that the campaign required significant planning and coordination to maintain access to the targeted systems over an extended period.
The U.S. Department of Justice emphasized the threat posed by such operations to American innovation and national security. Officials noted that the software involved in the case is essential for the development of advanced aircraft and missile systems. The successful prosecution of Wu is expected to serve as a deterrent against similar attempts to steal intellectual property from U.S. government agencies.
Details regarding the extent of the data breach and the specific entities compromised remain under investigation. Authorities have not disclosed the full scope of the information accessed or whether the software was successfully transferred to China. Questions persist regarding the involvement of other state actors and the potential impact on ongoing defense projects.
Legal proceedings are expected to move forward in federal court, with Wu facing potential imprisonment if convicted. The case remains active as investigators continue to assess the damage and pursue additional leads related to the conspiracy. Further charges against other individuals involved in the operation may be announced in the coming weeks.