logo
Chinese customs seize 144 Pop Mart Labubu blind boxes at Wuhan Tianhe Airport

Chinese customs seize 144 Pop Mart Labubu blind boxes at Wuhan Tianhe Airport

Time of India6 hours ago

Wuhan customs detain Pop Mart Labubu figures for suspected resale
Customs officers at Wuhan Tianhe International Airport confiscated 144
Labubu 3.0 blind boxes
,
collectible figures
on June 17, from Pop Mart (09992.HK), after identifying suspicious items during luggage scans. The incident involved two inbound passengers who used the 'no declaration' channel while arriving on a supervised international flight.
According to a statement from the official WeChat account 'Customs Release,' customs authorities flagged irregular images in the luggage scans. Upon physical inspection, officials found that both individuals had packed large quantities of Pop Mart dolls, 144 units in total, all belonging to the Labubu 3.0 series.
Also read:
Rs 1.5 crore for a doll? The viral rise of Labubu and the madness behind it
The passengers stated that the purpose of importing the Labubu figures was to assist others in bringing them into the country, with the intention to resell them for profit. As of now, the detained items have not been released and are being held in accordance with
customs regulations
.
Live Events
Labubu, a product under the Pop Mart IP brand, has gained massive popularity worldwide, with collectors often queuing overnight to secure blind boxes upon release. The Labubu 3.0 series, in particular, has seen strong demand across Asia, making it a target for cross-border resale.
Chinese customs
regulations require individuals bringing commercial quantities of goods to declare them upon entry. The 'no declaration' channel is reserved for personal-use items within permitted limits. Failure to disclose commercial quantities may result in confiscation, fines, or further legal action.
Wuhan customs officials seized 144 Labubu 3.0 blind boxes from two inbound passengers at Tianhe Airport. The figures, popular collectibles from Pop Mart, were intended for resale. The passengers chose the 'no declaration' lane and admitted to importing the goods for profit. The items are currently being held by customs
Chinese customs seize 144
Pop Mart Labubu
blind boxes at
Wuhan Tianhe Airport
Pop Mart continues to experience growth across international markets due to the success of IP figures like Labubu, Dimoo, and Skullpanda. The company has responded to increasing demand by expanding its distribution, though unauthorized resales and grey market imports remain ongoing challenges.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Classroom case: ED raids 37 locations in Delhi, seizes 322 bank passbooks
Classroom case: ED raids 37 locations in Delhi, seizes 322 bank passbooks

Hans India

time38 minutes ago

  • Hans India

Classroom case: ED raids 37 locations in Delhi, seizes 322 bank passbooks

New Delhi: The Enforcement Directorate (ED), Delhi Zonal Office conducted search operations at 37 locations across the national Capital under the provisions of the Prevention of Money Laundering Act (PMLA), 2002 in the Delhi classroom construction irregularities case and recovered digital evidence and 322 bank passbooks linked to mule accounts opened in the names of labourers, allegedly to divert government funds. "During the searches, original departmental files belonging to the Government of National Capital Territory of Delhi (GNCTD) and rubber stamps of officials of Public Works Department (PWD), various incriminating documents showing fake invoices submitted to GNCTD departments, showing inflated/bogus claims, digital evidence and 322 bank passbooks linked to mule accounts opened in the names of labourers to divert government funds were recovered and seized", said an ED Press statement on Friday. It is pertinent to note here that the ED initiated this investigation on the basis of a First Information Report (FIR) registered by the Anti-Corruption Branch (ACB) on April 30, alleging irregularities in the construction of 12,748 classrooms or semi-permanent structures in government schools. On April 30, the ACB registered a FIR against senior Aam Aadmi Party (AAP) ministers Manish Sisodia (the then Education Minister) and Satyendar Jain (the then Public Works Department minister) and others, over alleged corruption in the construction of classrooms. The FIR was pertaining to financial misappropriation exceeding Rs 2,000 crore in the construction of approximately 12,748 additional classrooms by the PWD, between 2015 and 2023. Notably, Manish Sisodia on Friday was questioned for nearly three hours by the ACB over the same case. The former Deputy Chief Minister of Delhi left the ACB's office at around 2.40 P.M. after appearing before investigators around noon. While the former education minister accused the ruling Bharatiya Janata Party (BJP) of misusing investigative agencies for political vendetta, the ACB said that the scam involved inflated costs in the construction of classrooms and school buildings under the Delhi government.

China-Russia trust erodes as Beijing's hackers go rogue, launch cyberattacks to steal Ukraine war secrets
China-Russia trust erodes as Beijing's hackers go rogue, launch cyberattacks to steal Ukraine war secrets

Time of India

timean hour ago

  • Time of India

China-Russia trust erodes as Beijing's hackers go rogue, launch cyberattacks to steal Ukraine war secrets

China hackers target Russia despite alliance, seeking war secrets and battlefield data- China hackers targeting Russia have raised serious concerns as multiple cyberattacks linked to Chinese state-sponsored groups have reportedly breached Russian military and defense systems since the Ukraine war began. Despite public declarations of friendship between Moscow and Beijing, cyber analysts say the Chinese government has been actively spying on Russian technologies, including nuclear submarines, drone systems, and battlefield tactics. The breach highlights a growing undercurrent of distrust and strategic intelligence gathering even among so-called allies. Cyber groups tied to Beijing—like APT27 and APT31—are believed to be behind these stealthy operations, using phishing emails and malware to infiltrate sensitive Russian networks. Why are China hackers targeting Russia amid growing friendship? Despite a publicly strong relationship between China and Russia, cybersecurity experts say China hackers have been quietly breaching Russian systems since May 2022 — just months after Russia launched its full-scale invasion of Ukraine. These hacking attempts have continued steadily, with Chinese-linked groups digging into Russia's defense and military data. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Air conditioners without external unit. (click to see prices) Air Condition | Search Ads Search Now Undo According to cybersecurity researchers from TeamT5, one group named Sanyo impersonated a Russian engineering firm's email to seek data on nuclear submarines. The intention behind these cyber intrusions appears to be collecting information about Russia's battlefield operations, modern warfare tactics, and Western weapon technologies seen in Ukraine. Che Chang, a TeamT5 researcher, stated, 'China likely seeks to gather intelligence on Russia's military operations, defense progress, and geopolitical strategies.' This information could help China boost its own military readiness for future conflicts — particularly in regions like Taiwan, which remains a hotbed of geopolitical tension. Live Events What exactly did China's hackers target in Russia? According to cybersecurity researchers at SentinelLabs and Recorded Future, Chinese Advanced Persistent Threat (APT) groups , including APT27 (Emissary Panda) and APT31 (Zirconium) , have been aggressively targeting: Russian military contractors Government departments involved in defense R&D Email servers and document archives linked to Ukraine war planning The hackers reportedly used spear-phishing campaigns , spoofing Russian Ministry of Health notices to plant malware into classified internal systems. One malware strain, called PlugX , known for remote access and data exfiltration, was flagged in these Russian environments—previously used by China in espionage campaigns across Southeast Asia and the Middle East. What kind of information are Chinese hackers after in Russia? The China hackers targeting Russia campaign has been aimed at extracting sensitive military intelligence, especially battlefield-tested insights. Russian defense firms, including Rostec , were among the major targets. Cyber experts from Palo Alto Networks revealed that Chinese hacking groups have sought data on radar systems, satellite communications, drone warfare, and electronic warfare technology. Another method used by these hackers involved Microsoft Word-based malware files, which exploited software vulnerabilities to breach aviation and defense sectors. One particularly dangerous tool spotted in these attacks was Deed RAT , malware considered 'proprietary' among Chinese state-sponsored groups. According to Russian cybersecurity firm Positive Technologies, this malware has been used to attack Russian aerospace, security, and military sectors. Though Russian authorities have not officially acknowledged these attacks, a leaked classified document from Russia's FSB — the domestic security agency — described China as an 'enemy,' confirming internal concerns about Chinese espionage. While China and Russia continue to cooperate publicly, including military drills and joint diplomatic efforts, cyber experts say Beijing has long pursued a "friend-but-watcher" strategy . This means China often spies on both allies and adversaries to: Gauge battlefield conditions in Ukraine Evaluate Russia's military capabilities and vulnerabilities Shape its own geopolitical strategies, including Taiwan preparations According to Recorded Future, China increased cyber-espionage targeting Russia by 87% since early 2023 , focusing particularly on regions near Ukraine and Crimea . Who are the major Chinese hacking groups involved? Several well-known Chinese hacking groups have been identified by cybersecurity teams as being behind these operations. Mustang Panda , one of China's most active state-backed cyber espionage groups, expanded its activities after the war in Ukraine began. TeamT5 and Sophos researchers found that Mustang Panda targeted Russian government agencies and military officials — particularly near the China-Russia Siberian border. According to Rafe Pilling from Sophos, the group's operations often follow China's political or economic interests. 'Wherever China invests — whether West Africa, Southeast Asia, or Russia — Mustang Panda follows with targeted hacking,' said Pilling. He and U.S. intelligence sources believe Mustang Panda operates under the Chinese Ministry of State Security. The group even drew attention from American law enforcement. In January, the U.S. Justice Department indicted individuals tied to Mustang Panda for infecting thousands of systems worldwide, including government networks and devices used by Chinese dissidents. Another Chinese hacking group, Slime19 , has been consistently attacking Russia's energy, government, and defense infrastructure, according to TeamT5's Chang. Has China broken its cybersecurity pact with Russia? In 2009 and 2015, China and Russia publicly agreed not to hack each other's systems. However, analysts have long viewed those agreements as symbolic, lacking enforcement or trust. The evidence emerging since Russia's invasion of Ukraine proves that those deals hold little practical weight. The FSB document accessed by The New York Times shows that Russian intelligence views China's digital espionage as a serious threat. China, while outwardly cooperative with Russia in forums and bilateral trade, appears unwilling to rely on Moscow for open sharing of battlefield learnings. Instead, cyber intrusions have become the preferred route for collecting war data. 'The war in Ukraine shifted the priorities of both countries,' said Itay Cohen from Palo Alto Networks. 'Even though the public narrative was one of close ties, in reality, espionage increased.' How is Russia reacting to these cyber intrusions? Thus far, the Kremlin has not officially condemned China, possibly to avoid diplomatic fallout. However, anonymous Russian cybersecurity sources have told investigative outlet iStories that internal firewalls have been tightened and communications protocols are under review. The Federal Security Service (FSB) reportedly issued an internal memo warning of 'unusual East Asian-origin threats' in mid-2024. Still, no public attribution has been made. This silence may signal Russia's reluctance to publicly challenge China at a time when it faces intense pressure from NATO and the West. What does this mean for future China-Russia relations? While China remains one of Russia's most crucial trade partners — especially with the West largely isolating Moscow — the depth of China hackers targeting Russia reveals a fragile foundation beneath this alliance. The relationship, often described by Presidents Xi and Putin as a 'no-limits' partnership, is evidently full of limits when it comes to trust. China's hunger for military intelligence, especially regarding real-time warfare experience, is pushing it to take bold steps. For China, Russia's war offers a rare, real-world military case study that it can't afford to ignore — especially with tensions rising in the Taiwan Strait. Cyber intrusions are likely to continue, if not grow. As Russian officials stay silent and Chinese hackers grow more sophisticated, the digital battlefield between these two "allies" is already active — and evolving quickly. FAQs: Q1: Why are China hackers targeting Russia during the Ukraine war? To secretly collect Russian military intelligence and battlefield data. Q2: Who is Mustang Panda in the China hacking campaign? Mustang Panda is a top Chinese state-backed hacking group targeting Russia.

Kerala forest department blacklists 64 snake catchers for illegal practices
Kerala forest department blacklists 64 snake catchers for illegal practices

Time of India

timean hour ago

  • Time of India

Kerala forest department blacklists 64 snake catchers for illegal practices

Kochi: At least 64 authorised snake catchers of the forest department have been blacklisted for allegedly demanding excess money from residents to catch snakes and using unscientific methods while handling the reptiles. The department received complaints from the public alleging that some catchers were demanding thousands of rupees to catch snakes from their houses. A few catchers were reported to be catching snakes in an inebriated state while others often injured the animals during the process. "Usually, houseowners give Rs 300 or 500 to the catchers for meeting their travel expenses, which is acceptable. However, we received complaints that some snake catchers demanded Rs 2,000-3,000, claiming that it was midnight or they were coming from worksites to catch the snake. Owners are forced to give the amount considering the fact that the snake must be inside the house. Such handlers are exploiting the helplessness of houseowners, and the department cannot allow it. We blacklist such catchers by cancelling their certification. If they continue to catch snakes even after the blacklisting, their action will amount to hunting a scheduled animal, which is a punishable offence under the Protection of Wildlife Act 1972," said a forest officer. There are 3,072 certified catchers in the state. Of them, only 932 are active. Most of the certified catchers are based in Malappuram, where civil defence volunteers registered with the fire force come forward to undergo training to be certified snake catchers in the wake of recurring natural disasters there, said the officer. Under the Snake Awareness, Rescue and Protection App (SARPA) initiative, a platform where the public can connect with authorised snake catchers, around 58,000 snakes were rescued in Kerala since Jan 2021.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store