In a world where cybersecurity threats are becoming more sophisticated every day, a recent case involving a Chinese national, Song Wu, has once again highlighted how serious these threats can be.

Wu, an engineer working for a major Chinese aerospace and defense company, Aviation Industry Corporation of China (AVIC), has been charged in the US for running a multi-year spear-phishing campaign. His goal? To steal sensitive software and source code with both military and industrial uses.

Here’s a closer look at what unfolded, why it’s important, and what steps are being taken to hold him accountable.

What Is Spear-Phishing, and How Did Wu Pull It Off?

Spear-phishing is essentially a targeted cyber attack where the hacker pretends to be someone else to trick their victim into giving up sensitive information.

Instead of the blanket phishing emails we’ve all seen (those shady “your account has been compromised” emails), spear-phishing is much more personal.

In Song Wu’s case, he didn’t just cast a wide net; he carefully crafted emails pretending to be colleagues, researchers, and engineers.

Wu specifically targeted, according to a Monday US Attorney’s Office press release, people who had access to highly valuable proprietary software.

This Chinese national’s campaign spanned several years, during which he set his sights on US government agencies like NASA, the US Air Force, Navy, and Army, as well as major research universities and private aerospace companies.