All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "1240785",
"signature": "Article:1240785",
"url": "https://staging.dailymaverick.co.za/article/2022-04-20-empire-of-hacking-south-africa-caught-in-the-middle-of-us-china-spying-spat/",
"shorturl": "https://staging.dailymaverick.co.za/article/1240785",
"slug": "empire-of-hacking-south-africa-caught-in-the-middle-of-us-china-spying-spat",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Empire of hacking — South Africa caught in the middle of US-China spying spat",
"firstPublished": "2022-04-20 11:54:15",
"lastUpdate": "2022-04-20 11:54:15",
"categories": [
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "38",
"name": "World",
"signature": "Category:38",
"slug": "world",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/world/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "341015",
"name": "DM168",
"signature": "Category:341015",
"slug": "dm168",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/dm168/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 8986,
"contents": "<span style=\"font-weight: 400;\">Chinese government operatives allegedly targeted South Africa’s defence and maritime research sectors as part of what the US claims was an international hacking campaign aimed at stealing trade secrets, including about the Ebola virus.</span>\r\n\r\n<span style=\"font-weight: 400;\">The Chinese embassy in South Africa, however, has pointed a finger back at the US, accusing it of being the most prolific hacker targeting China.</span>\r\n\r\n<span style=\"font-weight: 400;\">This leaves South Africa in the middle of high-level cyber espionage claims and counter-claims.</span>\r\n\r\n<span style=\"font-weight: 400;\">The US flagging China is in addition to it announcing last month that Russian government employees had targeted South Africa as part of two massive hacking campaigns that were aimed at disrupting energy companies and critical infrastructure.</span>\r\n\r\n<i><span style=\"font-weight: 400;\">DM168</span></i><span style=\"font-weight: 400;\"> earlier this month reported that the Federal Bureau of Investigation (FBI) had claimed the hacking would enable “the Russian government to disrupt and damage such systems, if it wished”.</span>\r\n\r\n<span style=\"font-weight: 400;\">The Russian embassy in SA did not respond to </span><i><span style=\"font-weight: 400;\">DM168</span></i><span style=\"font-weight: 400;\"> requests for comment.</span>\r\n<h4><b>US is a ‘hacking empire’</b></h4>\r\n<span style=\"font-weight: 400;\">In July 2021, the office of public affairs in the US’s justice department alleged there was hacking “focused on information that was of significant economic benefit to China’s companies and commercial sectors, including information that would allow the circumvention of lengthy and resource-intensive research and development processes”.</span>\r\n\r\n<span style=\"font-weight: 400;\">The US alleged South Africa’s maritime and defence sectors were targeted.</span>\r\n\r\n<span style=\"font-weight: 400;\">This week, the Chinese embassy in South Africa, in response to </span><i><span style=\"font-weight: 400;\">DM168</span></i><span style=\"font-weight: 400;\"> queries about America’s claims, turned the table on the US, pointing to it as its biggest cyberhacker.</span>\r\n\r\n<span style=\"font-weight: 400;\">“China is a staunch defender of cybersecurity and also a major victim of hacking. We stand firmly against and crack down on all forms of cyberattacks and crimes,” it said.</span>\r\n\r\n<span style=\"font-weight: 400;\">“We are opposed to politicising and stigmatising cybersecurity issues, which is not conducive to resolving hacking issues and will only weaken mutual trust between countries and affect normal cooperation in this sphere.”</span>\r\n\r\n<span style=\"font-weight: 400;\">The embassy then pointed to the US as being its biggest cyberattacker: “The US is the largest source of cyberattacks targeting China. Data show that in 2020, relevant Chinese institutions captured 42 million malicious program samples,” it said.</span>\r\n\r\n<span style=\"font-weight: 400;\">“Of those originating overseas, 53% are from the US. The US doesn’t even spare its allies in tapping and surveillance.”</span>\r\n\r\n<span style=\"font-weight: 400;\">The Chinese embassy listed several examples of alleged US hacking involving figures from other countries. “So who is the real Empire of Hacking?” it asked. “In the face of all the facts and data, anyone with an objective and impartial attitude should be able to come to the right conclusion.”</span>\r\n<h4><b>The US’s claims</b></h4>\r\n<span style=\"font-weight: 400;\">In terms of its <a href=\"https://www.dailymaverick.co.za/article/2022-04-03-us-claims-south-africa-targeted-in-russias-global-hack-attack-campaigns/\">claims against Russia</a>, the US alleged that hacking activities targeting about 135 countries, including South Africa, occurred from July 2012 to November 2017.</span>\r\n\r\n<span style=\"font-weight: 400;\">This roughly coincides with the period when the Chinese government is also alleged by the US to have targeted an array of countries (between 2011 and 2018).</span>\r\n\r\n<span style=\"font-weight: 400;\">In 2015, however, the US and China came to an agreement in relation to cybersecurity.</span>\r\n\r\n<span style=\"font-weight: 400;\">“The United States and China agree that neither country’s government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors,” says a 2015 statement on the White House website.</span>\r\n\r\n<span style=\"font-weight: 400;\">So, if what the US is alleging about China is true, China broke the agreement. And the reverse is also true if the US hacked China.</span>\r\n\r\n<span style=\"font-weight: 400;\">In 2016, Wang Xiujun, China’s vice minister of cyberspace administration, referenced South Africa, saying: “We would like to encourage cooperation between Chinese and South African enterprises to push forward the digital development to benefit the people of both countries.”</span>\r\n<h4><b>FBI hunts alleged Chinese hackers</b></h4>\r\n<span style=\"font-weight: 400;\">In the China hacking saga, the US’s justice department announced in July last year that the indictment against four accused — Ding Xiaoyang, Cheng Qingmin, Zhu Yunmin and Wu Shurong — had been unsealed two months earlier. This made some of the documents in the case public.</span>\r\n\r\n<span style=\"font-weight: 400;\">The four suspects are wanted by the FBI.</span>\r\n\r\n<span style=\"font-weight: 400;\">“The object of the conspiracy,” the indictment alleged, “was to install malware and hacking tools on protected computers and to leverage such malware and tools to commit unauthorised computer intrusions, all with the goal of stealing information of value from foreign governments, universities, and companies on behalf of the [People’s Republic of China] and its instrumentalities.”</span>\r\n\r\n<span style=\"font-weight: 400;\">It was alleged that, in November 2017, those behind the campaign had installed malware on a system that a Malaysian political party operated. This was at a time when that party had a role in deciding about a Chinese state-owned enterprise’s bid on a rail contract in Malaysia.</span>\r\n\r\n<span style=\"font-weight: 400;\">The indictment explained how the hacking allegedly occurred. It said the Hainan Province’s ministry of state security (HSSD) was a provincial intelligence arm of China’s ministry of state security that was “primarily responsible for domestic counterintelligence, non-military foreign intelligence, and aspects of political and domestic security”.</span>\r\n<h4><b>Front company</b></h4>\r\n<span style=\"font-weight: 400;\">The indictment alleged that, in 2011, the HSSD had created a front company, Hainan Xiandun Technology Development Co Ltd, described as “a fast-growing high-tech information security company”.</span>\r\n\r\n<span style=\"font-weight: 400;\">The US, however, believed that the alleged front company employed hackers “who sought to and did steal such data from companies and universities involved in virus and vaccine research of the Ebola virus and maritime research and development.</span>\r\n\r\n<span style=\"font-weight: 400;\">“Such trade secrets and confidential business included sensitive technologies used for submersibles and autonomous vehicles, speciality chemical formulas, and proprietary genetic-sequencing technology.”</span>\r\n\r\n<span style=\"font-weight: 400;\">The hackers, the indictment set out, were out to steal data from various governments with the aim of supporting China’s efforts to secure contracts in those targeted countries.</span>\r\n<h4><b>Target countries</b></h4>\r\n<span style=\"font-weight: 400;\">“Hainan Xiandun employees, under the direction of HSSD intelligence officers, hacked or attempted to hack dozens of victims in the United States, Austria, Cambodia, Canada, Germany, Indonesia, Malaysia, Norway, Saudi Arabia, South Africa, Switzerland and the United Kingdom, as well as others,” the indictment said.</span>\r\n\r\n<span style=\"font-weight: 400;\">It was alleged Xiaoyang, Qingmin and Yunmin directed the activities of the front company, as well as those of computer hackers, among them their co-accused, Shurong.</span>\r\n\r\n<span style=\"font-weight: 400;\">From December 2015 to January 2016, suspects used a specific email account to send spear-phishing emails — that is, emails targeted towards a specific individual, organisation or business that appear to be from a trusted source — “with embedded malware to multiple defence contractors and companies specialising in maritime research and development based in the United States, United Kingdom, South Africa and Austria”.</span>\r\n\r\n<span style=\"font-weight: 400;\">This was allegedly repeated between July and August 2016.</span>\r\n\r\n<span style=\"font-weight: 400;\">The US indictment did not name the targeted companies in South Africa.</span>\r\n\r\n<span style=\"font-weight: 400;\">It said those involved in the hacking “created online legends, such as fictitious online profiles for the spear-phishing email accounts” to make them look more legitimate.</span>\r\n\r\n<span style=\"font-weight: 400;\">“The conspirators also used doppelganger domain names, which were created to mimic or resemble the domains of legitimate companies, with the intent of tricking unwitting users into clicking on links, as well as hindering identification of intrusions by victim entities,” the indictment claims.</span>\r\n\r\n<span style=\"font-weight: 400;\">In one of the more bizarre acts, the accused in January 2018 allegedly “sent stolen trade secrets” to GitHub, a development platform and the world’s largest coding community. The secrets were apparently hidden in an image of a koala bear and in another of former US president Donald Trump.</span>\r\n<h4><b>SA is vulnerable</b></h4>\r\n<span style=\"font-weight: 400;\">In both cases where the US alleges South Africa was targeted by hackers, the FBI has announced it is searching for suspects.</span>\r\n\r\n<span style=\"font-weight: 400;\">Three of the four accused in the case involving Russia — Pavel Aleksandrovich Akulov, Mikhail Mikhailovich Gavrilov and Marat Valeryevich Tyukov — are wanted.</span>\r\n\r\n<span style=\"font-weight: 400;\">No South African entity has been named in either of the cases.</span>\r\n\r\n<span style=\"font-weight: 400;\">It is also not clear if South African entities were successfully hacked or simply targeted.</span>\r\n\r\n<span style=\"font-weight: 400;\">In November last year, </span><i><span style=\"font-weight: 400;\">DM168</span></i><span style=\"font-weight: 400;\"> reported on cyberattacks on government entities that had shown how vulnerable South Africa is to cybercriminals and ransomware assaults.</span>\r\n\r\n<span style=\"font-weight: 400;\">Among those that had been successfully targeted were Transnet and its division that operates South Africa’s biggest ports.</span>\r\n\r\n<span style=\"font-weight: 400;\">The identities of the hackers behind the attack were never publicly revealed. </span><b>DM168</b>\r\n\r\n<i><span style=\"font-weight: 400;\">This story first appeared in our weekly Daily Maverick 168 newspaper which is available for R25 at Pick n Pay, Exclusive Books and airport bookstores. For your nearest stockist, please click</span></i> <a href=\"https://168.dailymaverick.co.za/available-here.html\"><i><span style=\"font-weight: 400;\">here</span></i></a><i><span style=\"font-weight: 400;\">.</span></i>\r\n\r\n<img loading=\"lazy\" class=\"aligncenter size-full wp-image-1237003\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2022/04/DM-16042022001.jpg\" alt=\"\" width=\"720\" height=\"1095\" />",
"teaser": "Empire of hacking — South Africa caught in the middle of US-China spying spat",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "28437",
"name": "Caryn Dolley",
"image": "https://www.dailymaverick.co.za/wp-content/uploads/2023/09/Caryn_Dolley-1.png",
"url": "https://staging.dailymaverick.co.za/author/caryn-dolley/",
"editorialName": "caryn-dolley",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "371475",
"name": "Marat Valeryevich Tyukov",
"url": "https://staging.dailymaverick.co.za/keyword/marat-valeryevich-tyukov/",
"slug": "marat-valeryevich-tyukov",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Marat Valeryevich Tyukov",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "372742",
"name": "cybercriminals",
"url": "https://staging.dailymaverick.co.za/keyword/cybercriminals/",
"slug": "cybercriminals",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "cybercriminals",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "372741",
"name": "spear phishing",
"url": "https://staging.dailymaverick.co.za/keyword/spear-phishing/",
"slug": "spear-phishing",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "spear phishing",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "372740",
"name": "Wu Shurong",
"url": "https://staging.dailymaverick.co.za/keyword/wu-shurong/",
"slug": "wu-shurong",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Wu Shurong",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "372739",
"name": "Zhu Yunmin",
"url": "https://staging.dailymaverick.co.za/keyword/zhu-yunmin/",
"slug": "zhu-yunmin",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Zhu Yunmin",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "372738",
"name": "Cheng Qingmin",
"url": "https://staging.dailymaverick.co.za/keyword/cheng-qingmin/",
"slug": "cheng-qingmin",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cheng Qingmin",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "372737",
"name": "Ding Xiaoyang",
"url": "https://staging.dailymaverick.co.za/keyword/ding-xiaoyang/",
"slug": "ding-xiaoyang",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Ding Xiaoyang",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "372736",
"name": "Wang Xiujun",
"url": "https://staging.dailymaverick.co.za/keyword/wang-xiujun/",
"slug": "wang-xiujun",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Wang Xiujun",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "372735",
"name": "cyber espionage",
"url": "https://staging.dailymaverick.co.za/keyword/cyber-espionage/",
"slug": "cyber-espionage",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "cyber espionage",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "372734",
"name": "hacking campaign",
"url": "https://staging.dailymaverick.co.za/keyword/hacking-campaign/",
"slug": "hacking-campaign",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "hacking campaign",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "7007",
"name": "Counterintelligence",
"url": "https://staging.dailymaverick.co.za/keyword/counterintelligence/",
"slug": "counterintelligence",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Counterintelligence",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "371474",
"name": "Mikhail Mikhailovich Gavrilov",
"url": "https://staging.dailymaverick.co.za/keyword/mikhail-mikhailovich-gavrilov/",
"slug": "mikhail-mikhailovich-gavrilov",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Mikhail Mikhailovich Gavrilov",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "371473",
"name": "Pavel Aleksandrovich Akulov",
"url": "https://staging.dailymaverick.co.za/keyword/pavel-aleksandrovich-akulov/",
"slug": "pavel-aleksandrovich-akulov",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Pavel Aleksandrovich Akulov",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "85262",
"name": "Cybersecurity",
"url": "https://staging.dailymaverick.co.za/keyword/cybersecurity/",
"slug": "cybersecurity",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybersecurity",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "50953",
"name": "Ebola virus",
"url": "https://staging.dailymaverick.co.za/keyword/ebola-virus/",
"slug": "ebola-virus",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Ebola virus",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "20017",
"name": "Hacking",
"url": "https://staging.dailymaverick.co.za/keyword/hacking/",
"slug": "hacking",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Hacking",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12443",
"name": "Malware",
"url": "https://staging.dailymaverick.co.za/keyword/malware/",
"slug": "malware",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Malware",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12440",
"name": "Ransomware",
"url": "https://staging.dailymaverick.co.za/keyword/ransomware/",
"slug": "ransomware",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Ransomware",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12438",
"name": "Cyberattacks",
"url": "https://staging.dailymaverick.co.za/keyword/cyberattacks/",
"slug": "cyberattacks",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cyberattacks",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "51730",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2022/01/382904542.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/_hmdkQZB1msGYp0dHKq0LNiyRe8=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/01/382904542.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/oZPAHzkVxjLsiVXGJ8wVBy8-XNQ=/450x0/smart/file/dailymaverick/wp-content/uploads/2022/01/382904542.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/7P9qFv7lQ9t83ziKONgSfzmMrh8=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/01/382904542.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/ayJlM2IfXpHcxzEOFFjxFs2WCNc=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/01/382904542.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/lpJUK1I-l5az4rvPJcUfUjwNKjU=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/01/382904542.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/_hmdkQZB1msGYp0dHKq0LNiyRe8=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/01/382904542.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/oZPAHzkVxjLsiVXGJ8wVBy8-XNQ=/450x0/smart/file/dailymaverick/wp-content/uploads/2022/01/382904542.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/7P9qFv7lQ9t83ziKONgSfzmMrh8=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/01/382904542.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/ayJlM2IfXpHcxzEOFFjxFs2WCNc=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/01/382904542.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/lpJUK1I-l5az4rvPJcUfUjwNKjU=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/01/382904542.jpg",
"type": "image"
}
],
"summary": "As DM168 recently reported, the US claims hackers linked to Russia’s government targeted countries — including South Africa — in a campaign to disrupt the world’s energy sector. Now America has also implicated China, saying it targeted SA in another international hacking campaign. China, however, is having none of it.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Empire of hacking — South Africa caught in the middle of US-China spying spat",
"search_description": "<span style=\"font-weight: 400;\">Chinese government operatives allegedly targeted South Africa’s defence and maritime research sectors as part of what the US claims was an international hacking campaig",
"social_title": "Empire of hacking — South Africa caught in the middle of US-China spying spat",
"social_description": "<span style=\"font-weight: 400;\">Chinese government operatives allegedly targeted South Africa’s defence and maritime research sectors as part of what the US claims was an international hacking campaig",
"social_image": ""
},
"cached": true,
"access_allowed": true
}