Chinese National Carries Malware Into Mar-a-Lago

A Chinese woman arrested for entering the grounds of Mar-a-Lago under false pretenses was carrying electronic equipment holding malware.

Chinese national Yujing Zhang was arrested for breaching the perimeter at the Mar-a-Lago golf club in Florida and telling the US Secret Service she was there to attend a nonexistent event. While the details of her presence on the grounds while President Donald Trump was also there are somewhat murky, evidence suggests her arrest might be considered an antimalware win.

According to reports, when Zhang was stopped, she was carrying four mobile phones, one laptop computer, an external hard drive, and a thumb drive found to be housing "malicious software." "With the advent of BYOD, everyone learned that dangerous threats can be 'walked in' past cybersecurity controls whether the threats are on a laptop or a USB thumb drive," says Matt Walmsley, EMEA director at Vectra.

According to Zhang's statement to the Secret Service, she was asked by a friend named "Charles" to travel from Shanghai to Palm Beach, Florida, to talk with a member of the president's family about Chinese-American relations. She told officers that she had only spoken with Charles through WeChat, a messaging app popular in China.

"If someone can talk their way into Mar-a-Lago, then no location is really secure," says David Ginsburg, vice president of marketing at Cavirin. Reports of the incident have noted that, while the "United Nations Friendship Event" Zhang claimed to be visiting did not exist, an "International Leaders Elite Forum" produced by Li "Cindy" Yang had been scheduled but cancelled after press coverage of an incident that saw New England Patriots owner Robert Kraft charged with soliciting prostitution at a massage parlor once owned by Yang, a charge for which Kraft has pleaded not guilty.

Zhang, still in custody as of press time, is charged with making false statements to a federal officer and entering or remaining in a restricted building or grounds.

Read more here.

This article was updated to correct a reference to Robert Kraft.

INT19-Logo-HorizDates-3035.png

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

About the Author(s)

Curtis Franklin, Principal Analyst, Omdia

Curtis Franklin Jr. is Principal Analyst at Omdia, focusing on enterprise security management. Previously, he was senior editor of Dark Reading, editor of Light Reading's Security Now, and executive editor, technology, at InformationWeek, where he was also executive producer of InformationWeek's online radio and podcast episodes

Curtis has been writing about technologies and products in computing and networking since the early 1980s. He has been on staff and contributed to technology-industry publications including BYTE, ComputerWorld, CEO, Enterprise Efficiency, ChannelWeb, Network Computing, InfoWorld, PCWorld, Dark Reading, and ITWorld.com on subjects ranging from mobile enterprise computing to enterprise security and wireless networking.

Curtis is the author of thousands of articles, the co-author of five books, and has been a frequent speaker at computer and networking industry conferences across North America and Europe. His most recent books, Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center, and Securing the Cloud: Security Strategies for the Ubiquitous Data Center, with co-author Brian Chee, are published by Taylor and Francis.

When he's not writing, Curtis is a painter, photographer, cook, and multi-instrumentalist musician. He is active in running, amateur radio (KG4GWA), the MakerFX maker space in Orlando, FL, and is a certified Florida Master Naturalist.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights