Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: US-China cyber-war reaches Ethiopia
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: US-China cyber-war reaches Ethiopia
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Cyber EspionageEthiopiaNews

US-China cyber-war reaches Ethiopia

Tony Glover
September 26, 2023 at 6:57 PM
By Tony Glover Tony Glover
Share
SHARE

The news of the arrest of an IT administrator at the US Department of State’s Bureau of Intelligence and Research for allegedly stealing classified defense documents and delivering them to a foreign power is sending shock waves across government departments. There are also indications that China, currently known to be conducting a long-standing cyber-espionage campaign against the US, may be involved behind the scenes.

Top secret intelligence reports accessed and shared

It appears that the arrested man, Abraham Teklu Lemma, is not a staffer at the State Department but a U.S. Government contractor who has worked with various U.S. Government agencies since at least July 2021 and has had a TOP SECRET security clearance since at least 2020. Prior to working as a government contractor, Lemma claims to have worked at a bank in Maryland. Whatever his real resume is, Lemma systematically and ruthlessly betrayed his adopted country. He is a naturalized citizen of the United States who was previously a citizen of an African country that the Federal Bureau of Investigation (FBI), which uncovered the case, mysteriously refers to as the “Relevant Country.” However, the country in question is believed to be Ethiopia, Lemma’s country of birth.

According to the Affidavit for his arrest warrant: “Between on or about December 19, 2022, and August 7, 2023, Lemma copied and pasted information from at least 85 Intelligence Reports regarding many topics—the majority of which relate to the Relevant Country. Lemma accessed these Intelligence Reports without a need to know the classified information contained therein. During the same period, Lemma accessed at least an additional 48 Intelligence Reports without a need-to-know. According to DOS records, Lemma has, on multiple occasions, also printed and downloaded SECRET and TOP SECRET classified information from the Intelligence Reports.”

China may be being fed vital US defense intelligence

Ethiopia has yet to be seen as a significant cyber-espionage threat. China and Russia top the list of potentially hostile nations states known to be conducting a cyber campaign against the US, followed by countries including North Korea and Iran. However, sources close to the situation are already hinting the Chinese Communist Party may be being fed vital US defense intelligence by the Ethiopian government.

China and the US compete for influence in Ethiopia, which has major geopolitical significance as the seat of the African Union, in addition to the country’s strategic location in the Horn of Africa. Civil war erupted in Ethiopia in November 2020 after the leftist Tigray People’s Liberation Front (TPLF) was accused of attacking a military base. Although a peace treaty was signed, the US has suspended aid until certain criteria, such as full implementation of the peace process, are met. However, China regards the US sanctions as unwarranted interference in Ethiopia’s internal affairs.

But whichever power is eventually identified as being behind the theft of classified US defense documents, the case of Abraham Teklu Lemma also highlights two key aspects of cybersecurity that are often overlooked. One is the insider threat of someone within the organization stealing information, and the other is the danger of a supply-chain attack, where a contractor or supplier is identified at the weak spot in the target organization’s defenses.

Tony Glover October 13, 2023 September 26, 2023
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article The Daily Decrypt - One Minute Roundup Hack costs Mixin Network $200M – September 26th
Next Article The Daily Decrypt - One Minute Roundup HTX falls victim to crypto thieves – September 27th
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsOne Minute RoundupOne Minute Roundup

EU Launches Free Railway Cybersecurity Courses – June 16th

The International Union of Railways is launching cybersecurity courses specifically for the transport industry. Developed by industry specialists, the CYRUS training program aims to address the growing need for cybersecurity awareness in the industry, particularly among non-technical staff.

June 16, 2025
NewsOne Minute RoundupOne Minute Roundup

Geopolitical Tensions are Changing the Cybersecurity Landscape – June 13th

Political tensions are prompting nations to re-strategize cybersecurity. Countries that once sought international cooperation and joint strategies are now prioritizing domestic cyber capacities and national interests as a result of geopolitical instabilities.

June 13, 2025
CryptocurrencyNewsNorth Korea

Bogus IT workers are defrauding US businesses

The US government has seized over $7.74 million in illegal funds, allegedly siphoned off by illegitimate North Korean Information Technology (IT) workers for the benefit of the North Korean government. The US Department of Justice (DOJ) has filed a civil forfeiture complaint alleging that the IT workers secured employment in the US illegally, racking up millions of dollars in cryptocurrency and bypassing US sanctions placed against North Korea. According to the US Federal Bureau of Investigation (FBI), the use of North Korean IT workers to defraud the US is now taking place on a massive scale.

June 13, 2025
NewsOne Minute RoundupOne Minute Roundup

UK backs AI and intelligence modernization – June 12th

The UK government has announced its plans to invest in digital and artificial intelligence (AI) in public services, including the NHS, aiming to build strong technology foundations and tackle urgent cybersecurity risks.

June 12, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?