NASA Employees Tricked in Long Running Phishing Campaign Targeting Defense Software

Security investigators have uncovered a years long phishing campaign that successfully deceived employees at NASA and other U.S. organizations into sharing sensitive technology.

The operation involved a Chinese national who posed as a trusted researcher and contacted targets through carefully crafted messages. By impersonating colleagues and collaborators, the attacker convinced victims they were participating in legitimate professional exchanges.

The campaign ran from 2017 through 2021 and targeted individuals working at NASA, U.S. military branches, government agencies, universities, and private companies. Many of the victims were engineers and researchers with access to valuable aerospace and defense related software.

In several cases, the attacker succeeded in obtaining export controlled software and source code. Victims believed they were sharing materials with trusted contacts, not realizing they were sending sensitive data to an unauthorized actor.

The individual behind the campaign conducted extensive research on targets before reaching out, making the messages appear highly credible. This level of preparation helped bypass suspicion and increased the likelihood of success.

Authorities later identified the suspect and filed multiple criminal charges, including wire fraud and identity theft. The case highlights how social engineering tactics can be just as dangerous as technical exploits.

If successful, attacks like this can lead to the exposure of critical technologies related to aerospace design and national defense. Such breaches may also violate export control laws and create long term security risks.

Experts warn that this incident demonstrates the growing sophistication of phishing campaigns. Attackers are increasingly relying on trust based deception and detailed impersonation to gain access to high value information.

The findings emphasize the importance of verifying identities, limiting access to sensitive data, and maintaining strong awareness of social engineering threats, especially in organizations handling critical technologies.