An online dump of Chinese hacking documents offers a rare window into pervasive state surveillance | Ap | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker

Chinese police are investigating an unauthorized and highly unusual online dump of documents from a private security contractor linked to the nation’s top policing agency and other parts of its government — a trove that catalogs apparent hacking activity and tools to spy on both Chinese and foreigners.

Among the apparent targets of tools provided by the impacted company, I-Soon: ethnicities and dissidents in parts of China that have seen significant anti-government protests, such as Hong Kong or the heavily Muslim region of Xinjiang in China’s far west.

This page requires Javascript.

Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

kAm%96 5F>A @7 D4@C6D @7 5@4F>6?ED =2E6 =2DE H66< 2?5 DF3D6BF6?E :?G6DE:82E:@? H6C6 4@?7:C>65 3J EH@ 6>A=@J66D @7 x$@@?[ <?@H? 2D p?IF? 😕 |2?52C:?[ H9:49 92D E:6D E@ E96 A@H6C7F= |:?:DECJ @7 !F3=:4 $64FC:EJ] %96 5F>A[ H9:49 2?2=JDED 4@?D:56C 9:89=J D:8?:7:42?E 6G6? :7 :E 5@6D ?@E C6G62= 2?J 6DA64:2==J ?@G6= @C A@E6?E E@@=D[ :?4=F56D 9F?5C65D @7 A286D @7 4@?EC24ED[ >2C<6E:?8 AC6D6?E2E:@?D[ AC@5F4E >2?F2=D[ 2?5 4=:6?E 2?5 6>A=@J66 =:DED]k^Am

kAm%96J C6G62=[ 😕 56E2:=[ >6E9@5D FD65 3J r9:?6D6 2FE9@C:E:6D FD65 E@ DFCG6:= 5:DD:56?ED @G6CD62D[ 924< @E96C ?2E:@?D 2?5 AC@>@E6 AC@q6:;:?8 ?2CC2E:G6D @? D@4:2= >65:2]k^Am

kAm%96 5@4F>6?ED D9@H 2AA2C6?E x$@@? 924<:?8 @7 ?6EH@C<D 24C@DD r6?EC2= 2?5 $@FE962DE pD:2[ 2D H6== 2D w@?8 z@?8 2?5 E96 D6=7CF=65 :D=2?5 @7 %2:H2?[ H9:49 q6:;:?8 4=2:>D 2D :ED E6CC:E@CJ]k^Am

kAm%96 924<:?8 E@@=D 2C6 FD65 3J r9:?6D6 DE2E6 286?ED E@ F?>2D< FD6CD @7 D@4:2= >65:2 A=2E7@C>D @FED:56 r9:?2 DF49 2D )[ 7@C>6C=J <?@H? 2D %H:EE6C[ 3C62< :?E@ 6>2:= 2?5 9:56 E96 @?=:?6 24E:G:EJ @7 @G6CD62D 286?ED] p=D@ 56D4C:365 2C6 56G:46D 5:D8F:D65 2D A@H6C DEC:AD 2?5 32EE6C:6D E92E 42? 36 FD65 E@ 4@>AC@>:D6 (:u: ?6EH@C<D]k^Am

kAmx$@@? 2?5 r9:?6D6 A@=:46 2C6 :?G6DE:82E:?8 9@H E96 7:=6D H6C6 =62<65[ E96 EH@ x$@@? 6>A=@J66D E@=5 E96 p!] ~?6 @7 E96 6>A=@J66D D2:5 x$@@? 96=5 2 >66E:?8 (65?6D52J 23@FE E96 =62< 2?5 H6C6 E@=5 :E H@F=5?’E 27764E 3FD:?6DD E@@ >F49 2?5 E@ “4@?E:?F6 H@C<:?8 2D ?@C>2=]” %96 p! 😀 ?@E ?2>:?8 E96 6>A=@J66D — H9@ 5:5 AC@G:56 E96:C DFC?2>6D[ A6C 4@>>@? r9:?6D6 AC24E:46 — @FE @7 4@?46C? 23@FE A@DD:3=6 C6EC:3FE:@?]k^Am

kAm%96 D@FC46 @7 E96 =62< 😀 ?@E <?@H?] %96 r9:?6D6 u@C6:8? |:?:DECJ 5:5 ?@E :>>65:2E6=J C6DA@?5 E@ 2 C6BF6DE 7@C 4@>>6?E]k^Am

k9amp wxvw{* x|!pr%u&{ {tpzk^9am

kAmy@? r@?5C2[ 2? 2?2=JDE H:E9 #64@C565 uFEFC6[ 2 4J36CD64FC:EJ 4@>A2?J[ 42==65 :E E96 >@DE D:8?:7:42?E =62< 6G6C =:?<65 E@ 2 4@>A2?J “DFDA64E65 @7 AC@G:5:?8 4J36C 6DA:@?286 2?5 E2C86E65 :?ECFD:@? D6CG:46D 7@C E96 r9:?6D6 D64FC:EJ D6CG:46D]” w6 D2:5 @C82?:K2E:@?D E2C86E65 3J x$@@? — 244@C5:?8 E@ E96 =62<65 >2E6C:2= — :?4=F56 8@G6C?>6?ED[ E6=64@>>F?:42E:@?D 7:C>D 23C@25 2?5 @?=:?6 82>3=:?8 4@>A2?:6D H:E9:? r9:?2]k^Am

kAm&?E:= E96 `h_>6823JE6 =62<[ x$@@?’D H63D:E6 :?4=F565 2 A286 k2 9C67lQ9EEAi^^HHH]:D@@?]?6E^A40A2CE?6C]9E>=Qm=:DE:?8 4=:6?EDk^2m E@AA65 3J E96 |:?:DECJ @7 !F3=:4 $64FC:EJ 2?5 :?4=F5:?8 “ AC@G:?4:2==6G6= D64FC:EJ 3FC62FD 2?5 D@>6 c_ >F?:4:A2= AF3=:4 D64FC:EJ 56A2CE>6?ED]k^Am

kAmk2 9C67lQ9EEAi^^HHH]:D@@?]?6E^23@FE&D04@>A2?J]9E>=Qmp?@E96C A286 2G2:=23=6k^2m F?E:= 62C=J %F6D52J 25G6CE:D65 25G2?465 A6CD:DE6?E E9C62E “2EE24< 2?5 5676?D6” 42A23:=:E:6D[ FD:?8 E96 24C@?J> p!% — @?6 E96 4J36CD64FC:EJ :?5FDECJ 6>A=@JD E@ 56D4C:36 E96 H@C=5’D >@DE D@A9:DE:42E65 924<:?8 8C@FAD] x?E6C?2= 5@4F>6?ED 😕 E96 =62< 56D4C:36 x$@@? 52E232D6D @7 924<65 52E2 4@==64E65 7C@> 7@C6:8? ?6EH@C<D 2C@F?5 E96 H@C=5 E92E 2C6 25G6CE:D65 2?5 D@=5 E@ r9:?6D6 A@=:46]k^Am

kAm%96 4@>A2?J’D H63D:E6 H2D 7F==J @77=:?6 =2E6C %F6D52J] p? x$@@? C6AC6D6?E2E:G6 C67FD65 2? :?E6CG:6H C6BF6DE 2?5 D2:5 E96 4@>A2?J H@F=5 :DDF6 2? @77:4:2= DE2E6>6?E 2E 2? F?DA64:7:65 7FEFC6 52E6]k^Am

kAmx$@@? H2D 7@F?565 😕 $92?892: 😕 a_`_[ 244@C5:?8 E@ r9:?6D6 4@CA@C2E6 C64@C5D[ 2?5 92D DF3D:5:2C:6D 😕 E9C66 @E96C 4:E:6D[ :?4=F5:?8 @?6 😕 E96 D@FE9H6DE6C? 4:EJ @7 r96?85F E92E 😀 C6DA@?D:3=6 7@C 924<:?8[ C6D62C49 2?5 56G6=@A>6?E[ 244@C5:?8 E@ =62<65 :?E6C?2= D=:56D]k^Am

kAmx$@@?’D r96?85F DF3D:5:2CJ H2D @A6? 2D FDF2= @? (65?6D52J] #65 {F?2C }6H *62C =2?E6C?D DH2J65 😕 E96 H:?5 😕 2 4@G6C65 2==6JH2J =625:?8 E@ E96 7:G6DE@CJ 3F:=5:?8 9@FD:?8 x$@@?’D r96?85F @77:46D] t>A=@J66D DEC62>65 😕 2?5 @FE[ D>@<:?8 4:82C6EE6D 2?5 D:AA:?8 E2<6@FE 4@7766D @FED:56] x?D:56[ A@DE6CD H:E9 E96 r@>>F?:DE !2CEJ 92>>6C 2?5 DE:4<=6 6>3=6> 762EFC65 D=@82?D E92E C625i “$2768F2C5:?8 E96 !2CEJ 2?5 E96 4@F?ECJ’D D64C6ED 😀 6G6CJ 4:E:K6?’D C6BF:C65 5FEJ]Qk^Am

kAmx$@@?’D E@@=D 2AA62C E@ 36 FD65 3J r9:?6D6 A@=:46 E@ 4FC3 5:DD6?E @? @G6CD62D D@4:2= >65:2 2?5 7=@@5 E96> H:E9 AC@q6:;:?8 4@?E6?E] pFE9@C:E:6D 42? DFCG6:= r9:?6D6 D@4:2= >65:2 A=2E7@C>D 5:C64E=J 2?5 @C56C E96> E@ E2<6 5@H? 2?E:8@G6C?>6?E A@DED] qFE E96J =24< E92E 23:=:EJ @? @G6CD62D D:E6D =:<6 u2463@@< @C )[ H96C6 >:==:@?D @7 r9:?6D6 FD6CD 7=@4< E@ 😕 @C56C E@ 6G256 DE2E6 DFCG6:==2?46 2?5 46?D@CD9:A]k^Am

kAm“%96C6’D 2 9F86 :?E6C6DE 😕 D@4:2= >65:2 >@?:E@C:?8 2?5 4@>>6?E:?8 @? E96 A2CE @7 E96 r9:?6D6 8@G6C?>6?E[” D2:5 |2C6:<6 ~9=36C8[ 2 D6?:@C 76==@H 😕 E96 pD:2 !C@8C2> @7 E96 v6C>2? |2CD92== uF?5] $96 C6G:6H65 D@>6 @7 E96 5@4F>6?ED]k^Am

kAm%@ 4@?EC@= AF3=:4 @A:?:@? 2?5 7@C6DE2== 2?E:8@G6C?>6?E D6?E:>6?E[ ~9=36C8 D2:5[ 4@?EC@= @7 4C:E:42= A@DED 5@>6DE:42==J 😀 A:G@E2=] “r9:?6D6 2FE9@C:E:6D[Q D96 D2:5[ Q92G6 2 3:8 :?E6C6DE 😕 EC24<:?8 5@H? FD6CD H9@ 2C6 32D65 😕 r9:?2]Qk^Am

kAm%96 D@FC46 @7 E96 =62< 4@F=5 36 “2 C:G2= :?E6==:86?46 D6CG:46[ 2 5:DD2E:D7:65 :?D:56C[ @C 6G6? 2 C:G2= 4@?EC24E@C[” D2:5 49:67 E9C62E 2?2=JDE y@9? wF=EBF:DE @7 v@@8=6’D |2?5:2?E 4J36CD64FC:EJ 5:G:D:@?] %96 52E2 :?5:42E6D x$@@?’D DA@?D@CD 2=D@ :?4=F56 E96 |:?:DECJ @7 $E2E6 $64FC:EJ 2?5 r9:?2VD >:=:E2CJ[ E96 !6@A=6’D {:36C2E:@? pC>J[ wF=EBF:DE D2:5]k^Am

k9am{~%$ ~u %p#vt%$[ {~%$ ~u r~&}%#xt$k^9am

kAm~?6 =62<65 5C27E 4@?EC24E D9@HD x$@@? H2D >2C<6E:?8 “2?E:E6CC@C” E649?:42= DFAA@CE E@ ):?;:2?8 A@=:46 E@ EC24< E96 C68:@?’D ?2E:G6 &J89FCD 😕 r6?EC2= 2?5 $@FE962DE pD:2[ 4=2:>:?8 :E 925 2446DD E@ 924<65 2:C=:?6[ 46==F=2C 2?5 8@G6C?>6?E 52E2 7C@> 4@F?EC:6D =:<6 |@?8@=:2[ |2=2JD:2[ p7892?:DE2? 2?5 %92:=2?5] xE 😀 F?4=62C H96E96C E96 4@?E24E H2D D:8?65]k^Am

kAm“(6 D66 2 =@E @7 E2C86E:?8 @7 @C82?:K2E:@?D E92E 2C6 C6=2E65 E@ 6E9?:4 >:?@C:E:6D — %:36E2?D[ &J89FCD] p =@E @7 E96 E2C86E:?8 @7 7@C6:8? 6?E:E:6D 42? 36 D66? E9C@F89 E96 =6?D @7 5@>6DE:4 D64FC:EJ AC:@C:E:6D 7@C E96 8@G6C?>6?E[” D2:5 s2<@E2 r2CJ[ 2 r9:?2 2?2=JDE H:E9 E96 4J36CD64FC:EJ 7:C> $6?E:?6=~?6]k^Am

kAmw6 D2:5 E96 5@4F>6?ED 2AA62C =68:E:>2E6 3642FD6 E96J 2=:8? H:E9 H92E H@F=5 36 6IA64E65 7C@> 2 4@?EC24E@C 924<:?8 @? 3692=7 @7 r9:?2’D D64FC:EJ 2AA2C2EFD H:E9 5@>6DE:4 A@=:E:42= AC:@C:E:6D]k^Am

kAmr2CJ 7@F?5 2 DAC625D966E H:E9 2 =:DE @7 52E2 C6A@D:E@C:6D 4@==64E65 7C@> G:4E:>D 2?5 4@F?E65 `c 8@G6C?>6?ED 2D E2C86ED[ :?4=F5:?8 x?5:2[ x?5@?6D:2 2?5 }:86C:2] %96 5@4F>6?ED :?5:42E6 E92E x$@@? >@DE=J DFAA@CED E96 |:?:DECJ @7 !F3=:4 $64FC:EJ[ 96 D2:5]k^Am

kAmr2CJ H2D 2=D@ DECF4< 3J E96 E2C86E:?8 @7 %2:H2?’D w62=E9 |:?:DECJ E@ 56E6C>:?6 :ED r~’xs`h 42D6=@25 😕 62C=J a_a` – 2?5 :>AC6DD65 3J E96 =@H 4@DE @7 D@>6 @7 E96 924<D] %96 5@4F>6?ED D9@H E92E x$@@? 492C865 Sdd[___ E@ 924< ‘:6E?2>’D 64@?@>J >:?:DECJ[ 96 D2:5]k^Am

kAmp=E9@F89 2 76H 492E C64@C5D C676C E@ }p%~[ E96C6 😀 ?@ :?5:42E:@? @7 2 DF446DD7F= 924< @7 2?J }p%~ 4@F?ECJ[ 2? :?:E:2= C6G:6H @7 E96 52E2 3J %96 pDD@4:2E65 !C6DD 7@F?5] %92E 5@6D?’E >62? DE2E6324<65 r9:?6D6 924<6CD 2C6 ?@E ECJ:?8 E@ 924< E96 &]$] 2?5 :E’D 2==:6D[ E9@F89] x7 E96 =62<6C 😀 :?D:56 r9:?2[ H9:49 D66>D =:<6=J[ r2CJ D2:5 E92E “=62<:?8 :?7@C>2E:@? 23@FE 924<:?8 }p%~ H@F=5 36 C62==J[ C62==J :?7=2>>2E@CJQ — 2 C:D< 2AE E@ >2<6 r9:?6D6 2FE9@C:E:6D >@C6 56E6C>:?65 E@ :56?E:7J E96 924<6C]k^Am

kAm|2E9:6F %2CE2C6[ 2 >2=H2C6 C6D62C496C 2E E96 4J36CD64FC:EJ 7:C> t$t%[ D2JD :E 92D =:?<65 x$@@? E@ 2 r9:?6D6 DE2E6 924<:?8 8C@FA :E 42==D u:D9>@?86C E92E :E 24E:G6=J EC24<D 2?5 H9:49 :E k2 9C67lQ9EEADi^^HHH]H6=:G6D64FC:EJ]4@>^a_a_^_`^b`^H:??E:8C@FAE2C86E:?8F?:G6CD:E:6D9@?8<@?8^QmHC@E6 23@FE 😕 y2?F2CJ a_a_k^2m 27E6C E96 8C@FA 924<65 w@?8 z@?8 F?:G6CD:E:6D 5FC:?8 DEF56?E AC@E6DED] w6 D2:5 :E 92D[ D:?46 a_aa[ D66? u:D9>@?86C E2C86E 8@G6C?>6?ED[ }v~D 2?5 E9:?< E2?<D 24C@DD pD:2[ tFC@A6[ r6?EC2= p>6C:42 2?5 E96 &?:E65 $E2E6D]k^Am

kAmuC6?49 4J36CD64FC:EJ C6D62C496C q2AE:DE6 #@36CE 2=D@ 4@>365 E9C@F89 E96 5@4F>6?ED 2?5 D2:5 :E D66>65 x$@@? 925 7@F?5 2 H2J E@ 924< 244@F?ED @? )[ 7@C>6C=J <?@H? 2D %H:EE6C[ 6G6? :7 E96J 92G6 EH@724E@C 2FE96?E:42E:@?[ 2D H6== 2D 2?@E96C 7@C 2?2=JK:?8 6>2:= :?3@I6D] w6 D2:5 &]$] 4J36C @A6C2E@CD 2?5 E96:C 2==:6D 2C6 2>@?8 A@E6?E:2= DFDA64ED 😕 E96 x$@@? =62< 3642FD6 :E’D 😕 E96:C :?E6C6DED E@ 6IA@D6 r9:?6D6 DE2E6 924<:?8]k^Am

kAmp DA@<6DH@>2? 7@C &]$] rJ36C r@>>2?5 H@F=5?VE 4@>>6?E @? H96E96C E96 }2E:@?2= $64FC:EJ p86?4J @C rJ36C4@> H6C6 :?G@=G65 😕 E96 =62<] p? 6>2:= E@ E96 AC6DD @77:46 2E ) C6DA@?565[ “qFDJ ?@H[ A=62D6 4964< 324< =2E6C]”k^Am

kAm(6DE6C? 8@G6C?>6?ED[ :?4=F5:?8 E96 &?:E65 $E2E6D[ 92G6 E2<6? DE6AD E@ 3=@4< r9:?6D6 DE2E6 DFCG6:==2?46 2?5 92C2DD>6?E @7 8@G6C?>6?E 4C:E:4D @G6CD62D 😕 C646?E J62CD] {2FC2 w2CE9[ 42>A2:8? 5:C64E@C 2E $2768F2C5 s676?56CD[ 2? 25G@424J 8C@FA E92E 7@4FD6D @? 9F>2? C:89ED 😕 r9:?2[ D2:5 DF49 E24E:4D :?DE:== 762C @7 E96 r9:?6D6 8@G6C?>6?E 😕 r9:?6D6 2?5 7@C6:8? 4:E:K6?D 23C@25[ DE:7=:?8 4C:E:4:D> 2?5 =625:?8 E@ D6=746?D@CD9:A] “%96J 2C6 2 =@@>:?8 E9C62E E92E 😀 ;FDE 4@?DE2?E=J E96C6 2?5 G6CJ 92C5 E@ D92<6 @77]Qk^Am

kAm{2DE J62C[ &]$] @77:4:2=D k2 9C67lQ9EEADi^^HHH];FDE:46]8@G^@A2^AC^c_@77:46CD49:?2D?2E:@?2=A@=:46492C865EC2?D?2E:@?2=C6AC6DD:@?D496>6DE2C86E:?8FDQm492C865 c_ >6>36CD @7 r9:?6D6 A@=:46 F?:EDk^2m 2DD:8?65 E@ 92C2DD E96 72>:=J >6>36CD @7 r9:?6D6 5:DD:56?ED @G6CD62D 2D H6== 2D E@ DAC625 AC@q6:;:?8 4@?E6?E @?=:?6] %96 :?5:4E>6?ED 56D4C:36D E24E:4D D:>:=2C E@ E9@D6 56E2:=65 😕 E96 x$@@? 5@4F>6?ED[ w2CE9 D2:5] r9:?6D6 @77:4:2=D 92G6 244FD65 E96 &?:E65 $E2E6D @7 D:>:=2C 24E:G:EJ] &]$] @77:4:2=D :?4=F5:?8 uqx s:C64E@C r9C:D (2CJ 92G6 k2 9C67lQ9EEADi^^2A?6HD]4@>^2CE:4=6^73:49:?26DA:@?286924<:?853ab55he475gad6chgggda2bc2hh5c62QmC646?E=J 4@>A=2:?65k^2m 23@FE r9:?6D6 DE2E6 924<6CD A=2?E:?8 >2=H2C6 E92E 4@F=5 36 FD65 E@ 52>286 4:G:=:2? :?7C2DECF4EFC6]k^Am

kAm~? |@?52J[ |2@ }:?8[ 2 r9:?6D6 u@C6:8? |:?:DECJ DA@<6DH@>2?[ D2:5 E96 &]$] 8@G6C?>6?E 92D =@?8 366? H@C<:?8 E@ 4@>AC@>:D6 r9:?2’D 4C:E:42= :?7C2DECF4EFC6] $96 56>2?565 E96 &]$] “DE@A FD:?8 4J36CD64FC:EJ :DDF6D E@ D>62C @E96C 4@F?EC:6D]”k^Am

k9C ^m

kAmz2?8 C6A@CE65 7C@> r96?85F[ r9:?2] p! ;@FC?2=:DED s:5: %2?8 😕 (2D9:?8E@?[ s]r][ 2?5 {2CCJ u6?? 😕 }6H *@C< 4@?EC:3FE65 E@ E9:D C6A@CE]k^Am


Click Here For The Original Story From This Source.


National Cyber Security