Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: US-China cyber-war reaches Ethiopia
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: US-China cyber-war reaches Ethiopia
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
NewsCyber EspionageEthiopia

US-China cyber-war reaches Ethiopia

Tony Glover
September 26, 2023 at 6:57 PM
By Tony Glover Tony Glover
Share
SHARE

The news of the arrest of an IT administrator at the US Department of State’s Bureau of Intelligence and Research for allegedly stealing classified defense documents and delivering them to a foreign power is sending shock waves across government departments. There are also indications that China, currently known to be conducting a long-standing cyber-espionage campaign against the US, may be involved behind the scenes.

Top secret intelligence reports accessed and shared

It appears that the arrested man, Abraham Teklu Lemma, is not a staffer at the State Department but a U.S. Government contractor who has worked with various U.S. Government agencies since at least July 2021 and has had a TOP SECRET security clearance since at least 2020. Prior to working as a government contractor, Lemma claims to have worked at a bank in Maryland. Whatever his real resume is, Lemma systematically and ruthlessly betrayed his adopted country. He is a naturalized citizen of the United States who was previously a citizen of an African country that the Federal Bureau of Investigation (FBI), which uncovered the case, mysteriously refers to as the “Relevant Country.” However, the country in question is believed to be Ethiopia, Lemma’s country of birth.

According to the Affidavit for his arrest warrant: “Between on or about December 19, 2022, and August 7, 2023, Lemma copied and pasted information from at least 85 Intelligence Reports regarding many topics—the majority of which relate to the Relevant Country. Lemma accessed these Intelligence Reports without a need to know the classified information contained therein. During the same period, Lemma accessed at least an additional 48 Intelligence Reports without a need-to-know. According to DOS records, Lemma has, on multiple occasions, also printed and downloaded SECRET and TOP SECRET classified information from the Intelligence Reports.”

China may be being fed vital US defense intelligence

Ethiopia has yet to be seen as a significant cyber-espionage threat. China and Russia top the list of potentially hostile nations states known to be conducting a cyber campaign against the US, followed by countries including North Korea and Iran. However, sources close to the situation are already hinting the Chinese Communist Party may be being fed vital US defense intelligence by the Ethiopian government.

China and the US compete for influence in Ethiopia, which has major geopolitical significance as the seat of the African Union, in addition to the country’s strategic location in the Horn of Africa. Civil war erupted in Ethiopia in November 2020 after the leftist Tigray People’s Liberation Front (TPLF) was accused of attacking a military base. Although a peace treaty was signed, the US has suspended aid until certain criteria, such as full implementation of the peace process, are met. However, China regards the US sanctions as unwarranted interference in Ethiopia’s internal affairs.

But whichever power is eventually identified as being behind the theft of classified US defense documents, the case of Abraham Teklu Lemma also highlights two key aspects of cybersecurity that are often overlooked. One is the insider threat of someone within the organization stealing information, and the other is the danger of a supply-chain attack, where a contractor or supplier is identified at the weak spot in the target organization’s defenses.

Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article The Daily Decrypt - One Minute Roundup Hack costs Mixin Network $200M – September 26th
Next Article The Daily Decrypt - One Minute Roundup HTX falls victim to crypto thieves – September 27th
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsSpyware

Spyware poses a growing threat

“Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware,” warns the Atlantic Council, a Washington, DC-based organization that promotes transatlantic cooperation and global economic prosperity. The number of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors, according to a report published by the Atlantic Council on September 10: Mythical Beasts: Diving into the depths of the global spyware market.

September 12, 2025
CybergangsNews

Teenage hackers take down JLR

Carmaker Jaguar Land Rover (JLR) has shut down its systems after suffering a cyber-attack. The group claiming responsibility for the attack, The Com, also referred to as Scattered Spider, is a loosely affiliated online community of predominantly teenage English-speaking hackers based in the UK and the US.

September 5, 2025
Cyber EspionageGovernmentGeopoliticsNews

Over half of cyber-attacks are state-sponsored

Over half of cyber-attacks exploiting known vulnerabilities are the work of state-sponsored groups from abroad, mainly from China. According to cybersecurity company Recorded Future’s research arm, Insikt Group, 53 percent of observed exploitation activity in the first half of this year was driven by state-sponsored and suspected state-sponsored actors and conducted for espionage, surveillance, or other geopolitical objectives.

September 2, 2025
ChinaCyber EspionageSurveillanceSpywareNews

China is now spying on you

The Chinese government now has a vast storehouse of confidential information belonging to key industries and individuals in the US and UK and many other countries. According to an urgent joint cybersecurity advisory issued by the US National Security Agency (NSA) and other U.S. and foreign organizations, threat actors sponsored by the Chinese government, notably Salt Typhoon, have been consistently targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally.

August 29, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?