← Back to Geopolitical

Chinese National Charged in Multi-Year Cyber Campaign Targeting U.S. Aerospace Secrets

GeopoliticalAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

WASHINGTON — A Chinese national employed by the Aviation Industry Corporation of China was identified Thursday as the lead actor in a multi-year cyber espionage campaign that targeted NASA, U.S. government agencies, universities, and private defense contractors to steal sensitive aerospace software.

Song Wu, a citizen of China, allegedly impersonated a U.S. researcher to execute a sophisticated spear-phishing operation. The campaign sought to acquire restricted proprietary software used for aerospace engineering and computational fluid dynamics. Officials stated the stolen data is critical for the development of advanced tactical missiles and the aerodynamic design and assessment of weapons systems.

The operation spanned several years and targeted a broad spectrum of American institutions. Victims included federal agencies, academic research centers, and private firms involved in national defense and space exploration. The stolen intellectual property is designed to accelerate China's capabilities in high-speed flight and weapons development.

Wu is employed by AVIC, a state-owned conglomerate that serves as the primary aerospace manufacturer for the Chinese government. The corporation has been designated by U.S. authorities as a key entity in efforts to acquire foreign technology for military modernization. The investigation revealed that Wu utilized false credentials to gain access to secure networks, bypassing standard security protocols to download source code and engineering models.

The cyber intrusion was detected through routine monitoring of network traffic and anomalies in data access logs. Security teams traced the digital footprint back to servers located in China. The stolen software includes algorithms for simulating airflow over complex structures, a capability essential for designing hypersonic vehicles and precision-guided munitions.

U.S. officials emphasized the strategic significance of the theft. The software represents years of research and development funded by taxpayer dollars. Its compromise poses a direct threat to American technological superiority in the aerospace sector. The data could allow foreign adversaries to replicate advanced U.S. designs without incurring the cost of independent research.

No arrests have been announced as of Thursday afternoon. Authorities are working with international partners to determine the full extent of the data exfiltration. It remains unclear how much of the stolen code has already been integrated into Chinese weapons programs. Investigators are also assessing whether other entities within the U.S. aerospace supply chain were compromised during the operation.

The incident highlights the ongoing challenge of protecting critical infrastructure from state-sponsored cyber threats. As nations compete for dominance in space and air warfare, the protection of intellectual property has become a central component of national security strategy. Further details regarding the specific vulnerabilities exploited and the total volume of data stolen are expected to be released in the coming days.