Info@NationalCyberSecurity
Info@NationalCyberSecurity

Leaked Files Show the Secret World of China’s Hackers for Hire | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


A cache of documents from a Chinese security firm working for Chinese government agencies showed an extensive effort to hack many foreign governments and telecommunications firms, particularly in Asia, as well as targets of the country’s domestic surveillance apparatus.

The documents, which were posted to a public website last week, revealed an eight-year effort to target databases and tap communications in South Korea, Taiwan, Hong Kong, Malaysia, India and elsewhere in Asia. The files also revealed a campaign to monitor closely the activities of ethnic minorities in China and online gambling companies.

The files included records of apparent correspondence between employees as well as lists of targets and materials that showed off cyberattack tools. The documents came from I-Soon, a Shanghai company with offices in Chengdu. Three cybersecurity experts interviewed by The Times said the documents appeared to be authentic.

Taken together, the leaked files offered a look inside the secretive world of China’s state-backed hackers for hire. They underscored how Chinese law enforcement and its premier spy agency, the Ministry of State Security, have reached beyond their own ranks to tap private-sector talent in a global hacking campaign that United States officials say has targeted American infrastructure and government.

“We have every reason to believe this is the authentic data of a contractor supporting global and domestic cyber espionage operations out of China,” said John Hultquist, the chief analyst at Google’s Mandiant Intelligence.

Mr. Hultquist said that the data showed that I-Soon was working for a range of Chinese government entities that sponsor hacking, including the Ministry of State Security, the People’s Liberation Army, and China’s national police.

“They are part of an ecosystem of contractors that has links to the Chinese patriotic hacking scene, which developed two decades ago and has since gone legit,” he added, referring to the emergence of nationalist hackers who have become a kind of cottage industry.

The files showed how I-Soon could draw on a grab bag of technologies to operate as a hacking clearinghouse for branches of the Chinese government. At times the firm’s employees focused on overseas targets, and in other cases they helped China’s feared Ministry of Public Security surveil Chinese citizens domestically and overseas.

I-Soon did not immediately respond to emailed questions about the leak.

Materials included in the leak that promoted I-Soon’s hacking techniques described a technology built to break into Outlook email accounts and another that could control Windows computers, supposedly while evading 95 percent of antivirus systems. I-Soon bragged about having access to data from a range of governments and companies in Asia, including Taiwan, India, Nepal, Vietnam and Myanmar. One list showed extensive flight records from a Vietnamese airline, including travelers’ identity numbers, occupations and destinations.

At the same time, I-Soon said it had built technology that could meet the domestic demands of China’s police, including software that could monitor public sentiment on social media inside China. Another tool, built specifically to target accounts on X, could pull email addresses, phone numbers and other identifiable information related to user accounts.

In recent years, Chinese law enforcement officials have managed to identify activists and government critics who had posted on X using anonymous accounts from inside and outside China. Often they then used threats to force X users to take down posts that the authorities deemed overly critical or inappropriate.

China’s foreign ministry had no immediate response to a request for comment. X did not respond to a request seeking comment. A spokesman said the South Korean government would have no comment.

“This represents the most significant leak of data linked to a company suspected of providing cyberespionage and targeted intrusion services for the Chinese security services,” said Jonathan Condra, the director of strategic and persistent threats at Recorded Future, a cybersecurity firm. Analysis of the leak would give new insights into how contractors work with China’s government to carry out cyberespionage, he added.

The Chinese government’s use of private contractors to hack on its behalf borrows from the tactics of Iran and Russia, which for years have turned to nongovernmental entities to go after commercial and official targets. Although the scattershot approach to state espionage can be more effective, it has also proven harder to control. Some Chinese contractors have used malware to earn ransoms from private companies, even while working for China’s spy agency.

Over the past year U.S. government officials have repeatedly warned of Chinese hacking efforts. In late January, Christopher A. Wray, director of the Federal Bureau of Investigation, described an extensive campaign to target American infrastructure, including the power grid, oil pipelines and water systems, in the event of a conflict with Taiwan. Last year it emerged that the email accounts of a number of U.S. officials, including Nicholas Burns, the U.S. ambassador to China, and Commerce Secretary Gina Raimondo, had been hacked.

——————————————————–


Click Here For The Original Story From This Source.

.........................

National Cyber Security

FREE
VIEW