Monday, October 7, 2024
HomeComputer SecurityChinese Women Arrested for Secretly Carrying Malware in USB Drive at Trump’s...

Chinese Women Arrested for Secretly Carrying Malware in USB Drive at Trump’s Mar-a-Lago Club

Published on

A Chinese woman carrying malware in USB drive was arrested at Trump’s Mar-a-Lago club over the weekend during his Florida visit.

Yujing Zhang, 32 have been charged for 2 Federal crimes: For making a false statement to Federal officers and entering the restricted property.

According to court documents, she told Secret Service agents that she was the member of the pool and she wanted to use the pool, but upon further inquiry, she said that she had traveled from Shanghai to attend a “United Nations Friendship Event” between China and the United States.

- Advertisement - EHA

But there is no such event scheduled and she also not in the member’s list, agents said. Agent Samuel Ivanovich said she was taken off the grounds and she becomes argumentative, so she has been taken to Secret Service agents.

She carried out four cellphones, a laptop computer, an external hard drive and a thumb drive containing computer malware, but not having the swimsuit, reads APnews report.

She carried out four cellphones, a laptop computer, an external hard drive and a thumb drive containing computer malware, but not having the swimsuit, reads APnews report.

“While the Secret Service does not determine who is permitted to enter the club, our agents and officers conduct physical screenings to ensure no prohibited items are allowed onto the property,” a U.S. Secret Service spokesperson said.

According to APnews, “Yang recently made news after it was learned she was promising Chinese business leaders that her consulting firm could get them access to Mar-a-Lago”.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Operation SaboTor – Law Enforcement Agencies Arrested 61 Dark Web Users Who are Buying & Selling Malware

Two Hackers Arrested Linked to DDoS Attacks Face Jail up to Six Years

Indian Cyber Crime Police Arrested Largest Tech Support Scam Operators in India With the Help of Microsoft

42-year-old man Arrested For Hacking More than 2,000 Computers From 50 countries With DarkComet RAT

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA,...

RCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files

The researcher investigated the potential security risks associated with debugging dump files in Visual...

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been identified in the Cacti network monitoring tool that...

Microsoft & DOJ Dismantles Hundreds of Websites Used by Russian Hackers

Microsoft and the U.S. Department of Justice (DOJ) have disrupted the operations of Star...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA,...

RCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files

The researcher investigated the potential security risks associated with debugging dump files in Visual...

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been identified in the Cacti network monitoring tool that...