Amid ongoing scrutiny over Chinese-manufactured port cranes suspected of serving as espionage conduits, South Korea’s Meteorological Agency made a startling discovery when it identified malicious code in meteorological equipment imported from China.
Recent reports from multiple South Korean news sources confirm that the malicious code was found in June this year.
This revelation was initially disclosed by the National Intelligence Service (NIS) during a media-invited cybersecurity forum held in July. In collaboration with other relevant organizations, the NIS also announced a joint, extensive investigation into Chinese-manufactured devices, including Closed Circuit Television (CCTV) systems.
According to an investigative piece by IT Chosun, a subsidiary of the Chosun Ilbo, “Chinese cyber-attackers targeted a private firm in April that provides labor services to South Korean governmental bodies, attempting to infiltrate its internal network. In light of potential backdoor cyber-attacks already executed against South Korean entities, the NIS is examining whether Chinese suppliers intentionally equipped such devices for cyber-espionage.”
The report raised the possibility that should backdoors be present in the meteorological devices, Chinese cyber organizations could not only access but also manipulate real-time weather data in South Korea. A “backdoor” is a malicious code that evades security measures to gain access to systems or software illicitly.
Ports to End Importing Chinese-Made Cranes
In response to U.S. concerns, the South Korean government initiated an investigation into Chinese-manufactured port cranes in March.
An April report by Seoul Economic Daily revealed that subsequent measures are being formulated based on the ongoing investigation.
Additionally, remedial actions will be taken against existing Chinese cranes within the year.
Several South Korean port companies have already resolved to halt imports from China in favor of domestically produced alternatives.
Over half of the large cranes operating in South Korean ports originate from China. This number escalates to 75 percent at Pyeongtaek Port, near the U.S. Forces Korea headquarters. The U.S. military frequently utilizes this port to import weaponry and supplies.
In a notable development, the U.S. House of Representatives introduced legislation in May to prohibit the use of Chinese cranes in American ports and mandating safety reviews of all existing installations.
The spotlight is increasingly turning to Shanghai Zhenhua Heavy Industries Co. (ZPMC), which dominates over 70 percent of the global market.
Espionage Concerns in US
In a 2017 video interview published on Microsoft’s official website, Huang Qingfeng, the then-president of Shanghai Zhenhua Heavy Industries, revealed, “Through our main office in Shanghai, we can monitor all cranes to help troubleshoot.”
Fast forward to March this year, The Wall Street Journal reported concerns among U.S. officials, worried that large cranes manufactured in China and deployed in American ports, some even used by the U.S. military, could serve as espionage tools for the Chinese regime.
Almost 80 percent of cranes used in U.S. ports are manufactured by Shanghai Zhenhua Heavy Industries. These cranes come equipped with advanced sensors capable of tracking the origins and destinations of shipping containers, raising red flags about potential espionage activities that could compromise U.S. military operations globally.
William Evanina, former Director of the National Counterintelligence and Security Center (NCSC), cautioned, “[Chinese] Cranes can be the new Huawei”—a reference to the Chinese tech company currently under restrictions in numerous countries due to security concerns.
South Korea Bolsters Cybersecurity
In April, South Korean President Yoon Suk Yeol inked the “Strategic Cybersecurity Cooperation Framework” with the United States, expanding the allies’ cooperation into the cyber domain. This development came shortly after South Korea initiated efforts to reinforce its cybersecurity infrastructure.
Meanwhile, an investigation led by South Korea’s NIS assessed the usage of information technology (IT) products that are either directly or indirectly subject to international sanctions. Chinese and Russian products, including those from Huawei, were included in the extensive evaluation.
Data from South Korea’s Customs Service indicates that since 2017, Chinese-manufactured products have consistently constituted around 40 percent of South Korea’s telecommunications equipment imports.
Notably, LG U+, the country’s third-largest telecom provider, relies on Huawei equipment for its 4G (LTE) and 5G networks in selected areas within Seoul and Gyeonggi-do. It remains the only telecom company in South Korea to utilize Huawei products in its wireless networks.
In a timely legislative move, Kim Yeung-shik, a ruling People Power Party (PPP) lawmaker, introduced amendments to the Information and Communication Network Law before his U.S. visit in late April.
The proposed amendment aims to criminalize the establishment or dissemination of backdoors in information and communication networks. Violations could result in up to five years of imprisonment or a maximum fine of 50 million Korean won (approximately $38,000).
Lisa Bian
Author
Lisa Bian, B.Med.Sc., is a healthcare professional holding a Bachelor's Degree in Medical Science. With a rich background, she has accrued over three years of hands-on experience as a Traditional Chinese Medicine physician. In addition to her clinical expertise, she serves as an accomplished writer based in Korea, providing valuable contributions to The Epoch Times. Her insightful pieces cover a range of topics, including integrative medicine, Korean society, culture, and international relations.