Executive Summary
Between January 2017 and December 2021, Chinese national Song Wu orchestrated a sophisticated spear-phishing campaign targeting NASA, the U.S. military, universities, and private companies. By impersonating U.S. researchers and engineers, Wu successfully obtained sensitive aerospace software and source code, violating U.S. export control laws. The scheme led to unauthorized access to defense-related technologies, posing significant national security risks. In September 2024, Wu was indicted on multiple counts of wire fraud and aggravated identity theft but remains at large. This incident underscores the persistent threat of state-sponsored cyber espionage and the critical need for robust cybersecurity measures to protect sensitive information. Organizations must remain vigilant against increasingly sophisticated phishing tactics employed by foreign adversaries.
Why This Matters Now
The incident highlights the ongoing threat of state-sponsored cyber espionage targeting critical U.S. institutions. As phishing techniques become more sophisticated, organizations must enhance their cybersecurity protocols to safeguard sensitive information and comply with export control laws.
Attack Path Analysis
A Chinese national, Song Wu, impersonated U.S. researchers to conduct a spear-phishing campaign targeting NASA employees and collaborators, aiming to obtain sensitive aerospace software. After initial compromise through phishing, the attacker escalated privileges to access restricted data, moved laterally within networks to identify valuable assets, established command and control channels to exfiltrate data, and ultimately exfiltrated sensitive software, violating export control laws.
Kill Chain Progression
Initial Compromise
Description
The attacker, Song Wu, impersonated U.S. researchers and sent spear-phishing emails to NASA employees and collaborators, successfully deceiving them into sharing sensitive aerospace software.
MITRE ATT&CK® Techniques
Spearphishing Service
Spearphishing Attachment
Spearphishing Link
User Execution: Malicious Link
User Execution: Malicious File
Valid Accounts
Exfiltration Over C2 Channel
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
NIST SP 800-53 – Security Training: Social Engineering and Mining
Control ID: AT-2(3)
PCI DSS 4.0 – Security Awareness Program: Social Engineering
Control ID: 12.6.3
NYDFS 23 NYCRR 500 – Cybersecurity Awareness Training
Control ID: 500.14(b)
DORA – ICT Risk Management Framework: Awareness and Training
Control ID: Article 13(6)
CISA Zero Trust Maturity Model 2.0 – User Training on Phishing and Social Engineering
Control ID: Identity: Awareness Training
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Defense/Space
NASA targeting demonstrates direct exposure to Chinese spear-phishing campaigns seeking defense software and sensitive space technology in violation of export controls.
Higher Education/Acadamia
Universities targeted alongside NASA face spear-phishing risks from nation-state actors impersonating researchers to bypass academic collaboration trust and extract sensitive research.
Government Administration
Government entities explicitly targeted by Chinese nationals using social engineering to circumvent export control laws and access classified defense software systems.
Computer Software/Engineering
Private software companies developing defense applications face nation-state spear-phishing targeting sensitive code and intellectual property through compromised researcher identities.
Sources
- NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Softwarehttps://thehackernews.com/2026/04/nasa-employees-duped-in-chinese.htmlVerified
- NASA Investigators Expose a Chinese National Phishing for Defense Softwarehttps://oig.nasa.gov/recent-news/nasa-investigators-expose-a-chinese-national-phishing-for-defense-software/Verified
- Chinese National Charged for Multi-Year 'Spear-Phishing' Campaignhttps://oig.nasa.gov/office-of-inspector-general-oig/press-releases/chinese-national-charged-for-multi-year-spear-phishing-campaign/Verified
- Chinese national accused by US of NASA and military spear-phishing campaignhttps://www.techradar.com/pro/security/chinese-national-accused-by-us-of-nasa-and-military-spear-phishing-campaignVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have constrained the attacker's ability to escalate privileges, move laterally, and exfiltrate sensitive data by enforcing strict segmentation and identity-aware access controls.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix Zero Trust CNSF may not prevent initial phishing attempts, it could limit the attacker's subsequent network access, reducing the potential for further exploitation.
Control: Zero Trust Segmentation
Mitigation: Aviatrix Zero Trust Segmentation could likely restrict the attacker's ability to access higher-privileged systems, thereby limiting unauthorized access to sensitive data.
Control: East-West Traffic Security
Mitigation: Aviatrix East-West Traffic Security could likely limit the attacker's ability to move laterally, thereby reducing the scope of compromised systems.
Control: Multicloud Visibility & Control
Mitigation: Aviatrix Multicloud Visibility & Control could likely detect and disrupt unauthorized command and control channels, thereby limiting persistent access.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix Egress Security & Policy Enforcement could likely restrict unauthorized data exfiltration, thereby reducing the risk of sensitive information being transmitted to external servers.
By constraining the attacker's ability to escalate privileges, move laterally, and exfiltrate data, Aviatrix Zero Trust CNSF could likely reduce the overall impact of such incidents on national security and intellectual property.
Impact at a Glance
Affected Business Functions
- Research and Development
- Intellectual Property Management
- Export Compliance
Estimated downtime: N/A
Estimated loss: N/A
Potential exposure of sensitive aerospace design and weapons development software to unauthorized foreign entities.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to enforce least privilege access and prevent unauthorized lateral movement within the network.
- • Deploy East-West Traffic Security controls to monitor and restrict internal traffic, detecting and blocking unauthorized communications.
- • Utilize Egress Security & Policy Enforcement to control outbound traffic, preventing unauthorized data exfiltration.
- • Enhance Threat Detection & Anomaly Response capabilities to identify and respond to suspicious activities promptly.
- • Conduct regular security awareness training for employees to recognize and report phishing attempts and social engineering tactics.



