Blog Post

Prmagazine > News > News > US Charges 12 Alleged Spies in China’s Freewheeling Hacker-for-Hire Ecosystem
US Charges 12 Alleged Spies in China’s Freewheeling Hacker-for-Hire Ecosystem

US Charges 12 Alleged Spies in China’s Freewheeling Hacker-for-Hire Ecosystem

“Contractors and companies will be more or less speculative, which is driven by profits and need to invest in a wide range of networks,” the Justice Department official said. “China is cultivating reckless and dangerous globally vulnerable computers, even if it has no task or obtains the results of these hackers. This has led to a less secure and more vulnerable environment.”

: : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Prosecutors also noted that the company worked with 43 different MS and MPs in 31 Chinese provinces, which operates independently and often purchases the same products from I-Soon.

I-soon, his suspected hacker rents a business before Leaks in internal documents and communications According to the indictment, clients were provided with a “zero-day vulnerability library” of “zero-day vulnerability”. It also allegedly sold password crack tools and euphemistically named “penetration testing” products (prosecutors say, actually intended for uninformed victims), which allegedly included targeted phishing kits and tools to embed malware in file attachments.

The company also allegedly implemented targeting of its victims, with the Justice Department saying the media, dissidents, religious leaders and researchers, as well as critics of the Chinese government, and representatives of the New York State Legislature, one of which received an email from members of an unknown religious group banned in China.

Yin Kecheng and alleged partners of APT27 or Silk Typhoon Group are accused of hacking a wide variety of defense contractors, think tanks, a law firm, custodial communications service provider companies and other victims. In December, software contractor company Beyond Trust reminded the U.S. Treasury Department that the department was violated by an infringement on the BeyondTrust network, which was later attributed to a silk typhoon. In conjunction with today’s Justice Department allegations, Microsoft has also issued technical guidelines for operating silk typhoons, highlighting the way it is trying to leverage IT supply chains.

In communications in Yin’s indictment against him, colleagues suggested that instead of pursuing large victim organizations directly, they targeted their subsidiaries, noting that “they are the same and are more prone to attack.” Yin responded, agreeing that the strategy was “right”.

The 12 Chinese nationals accused remained in a whole and were likely to never see the inside of the U.S. court. But the State Department announced rewards about the information that led to its arrest, each arrested between $2 million and $10 million.

“For those who choose to assist CCP in illegal cyber activities, these allegations should prove that we will use all available tools to identify you and provide you with malicious activities and all activities for everyone,” Bryan Vorndran, assistant director of the FBI’s Cyber ​​Division, wrote in a statement.

Source link

Leave a comment

Your email address will not be published. Required fields are marked *

star360feedback