Tuesday, April 22, 2025
HomeComputer SecurityChinese Women Arrested for Secretly Carrying Malware in USB Drive at Trump’s...

Chinese Women Arrested for Secretly Carrying Malware in USB Drive at Trump’s Mar-a-Lago Club

Published on

SIEM as a Service

Follow Us on Google News

A Chinese woman carrying malware in USB drive was arrested at Trump’s Mar-a-Lago club over the weekend during his Florida visit.

Yujing Zhang, 32 have been charged for 2 Federal crimes: For making a false statement to Federal officers and entering the restricted property.

According to court documents, she told Secret Service agents that she was the member of the pool and she wanted to use the pool, but upon further inquiry, she said that she had traveled from Shanghai to attend a “United Nations Friendship Event” between China and the United States.

- Advertisement - Google News

But there is no such event scheduled and she also not in the member’s list, agents said. Agent Samuel Ivanovich said she was taken off the grounds and she becomes argumentative, so she has been taken to Secret Service agents.

She carried out four cellphones, a laptop computer, an external hard drive and a thumb drive containing computer malware, but not having the swimsuit, reads APnews report.

She carried out four cellphones, a laptop computer, an external hard drive and a thumb drive containing computer malware, but not having the swimsuit, reads APnews report.

“While the Secret Service does not determine who is permitted to enter the club, our agents and officers conduct physical screenings to ensure no prohibited items are allowed onto the property,” a U.S. Secret Service spokesperson said.

According to APnews, “Yang recently made news after it was learned she was promising Chinese business leaders that her consulting firm could get them access to Mar-a-Lago”.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Operation SaboTor – Law Enforcement Agencies Arrested 61 Dark Web Users Who are Buying & Selling Malware

Two Hackers Arrested Linked to DDoS Attacks Face Jail up to Six Years

Indian Cyber Crime Police Arrested Largest Tech Support Scam Operators in India With the Help of Microsoft

42-year-old man Arrested For Hacking More than 2,000 Computers From 50 countries With DarkComet RAT

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling...

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index

Trend Micro's Cyber Risk Exposure Management (CREM) solution has highlighted the critical role that...

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks

In a sophisticated onslaught targeting the open-source ecosystem, reports have emerged detailing several malicious...

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With No Expiration!

A glaring vulnerability has come to light within Samsung's One UI interface: the clipboard...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling...

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index

Trend Micro's Cyber Risk Exposure Management (CREM) solution has highlighted the critical role that...

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks

In a sophisticated onslaught targeting the open-source ecosystem, reports have emerged detailing several malicious...