HomeAttacks on U.S.Chinese Government Hackers for Hire - to Terrorists and other U.S. Enemies?

Chinese Government Hackers for Hire – to Terrorists and other U.S. Enemies?

Published on

spot_img

The recent exposure of a Chinese tech security firm, I-Soon, has peeled back the curtain on the shadowy, intricate world of cyber espionage, revealing a vast and complex network that targets not just governments and military alliances but also entities championing democracy across the globe. This breach, scrutinized by the keen eyes of cybersecurity experts from SentinelLabs and Malwarebytes, has laid bare the sophisticated and wide-reaching tentacles of cyber operations orchestrated by China’s intelligence and military groups, posing unprecedented challenges to global security.

The leaked documents from the Chinese tech security firm I-Soon provide a startling glimpse into the cyber espionage tools and services available not just to the Chinese government but also on the open market, highlighting the commercialization of state-sponsored hacking efforts. These offerings, once shrouded in secrecy, have been laid bare, revealing a menu of services tailored to a variety of clients, including government entities and possibly other actors with the means to pay for them.

Among the services offered, the documents detail:

  1. Access to Foreign Traffic Systems: For less than $15,000, clients could purchase access to the private website of traffic police in Vietnam. This type of service suggests a market for real-time information and surveillance capabilities that could be used for a range of purposes, from monitoring movements to potentially disrupting local infrastructure.
  2. Disinformation Campaigns and Account Hacking: Software designed to help run disinformation campaigns and hack accounts on various social media platforms, referred to as “X” in the documents, was priced at $100,000. This high-ticket item underscores the value placed on the ability to influence public opinion and manipulate social media landscapes.
  3. Personal Information Extraction: For $278,000, customers could acquire a trove of personal information behind social media accounts on platforms like Telegram and Facebook. This offering highlights the premium placed on personal data, which could be used for everything from targeted espionage to identity theft.
  4. Surveillance of Ethnic Minorities and Online Gambling: The documents also reveal a campaign to closely monitor the activities of ethnic minorities within China and online gambling companies. This indicates a domestic use of surveillance technology, likely aimed at maintaining social control and monitoring perceived threats to stability.
  5. Cyberattack Tools: The materials include records of apparent correspondence between employees, lists of targets, and showcases of cyberattack tools, suggesting a broad arsenal of digital weaponry available for sale. This range of tools indicates a sophisticated level of technical capability, designed to penetrate, disrupt, or spy on a wide array of digital systems.
  6. Recruitment and Marketing Strategies: I-Soon organized cybersecurity competitions to recruit new hires and marketed its wares to various government agencies city by city, suggesting a competitive and entrepreneurial approach to selling espionage services. This strategy implies a level of normalization and commercialization of hacking skills and services, treating state-sponsored espionage capabilities as marketable products.

The documents unearthed in this breach, a digital Pandora’s box, have given us a glimpse into the covert operations of I-Soon, a firm rooted in Shanghai but with branches reaching across China. The breach has compromised the digital sanctity of over a dozen foreign governments, infiltrating not only the personal domains of social media accounts and computers but also penetrating the defenses of various universities and even the NATO military alliance.

Through chat logs, presentations, and meticulous lists of targets, the leaked documents unveil a decade-spanning saga of digital espionage. Uploaded to GitHub and authenticated despite their anonymous source, these records paint a picture of a digital battleground, with targets spread across more than twenty foreign governments and regions, including the likes of India, Hong Kong, Thailand, South Korea, the United Kingdom, Taiwan, and Malaysia. It’s a testament to the global reach and ambition of cyber espionage efforts, driven not by traditional geopolitical boundaries but by the limitless expanse of the digital world.

The documents detail a financial landscape as varied as the operations themselves, with hackers’ earnings ranging from $1,400 to an astonishing $800,000, depending on the contract’s complexity and scope. This lucrative underworld of cyber espionage not only highlights the financial incentives driving hackers but also underscores the pivotal role these contractors play in the broader scheme of the Communist Party’s initiative to neutralize cyber threats to its governance. It’s a glimpse into a world where digital prowess is as valuable as traditional military might, if not more so.

Among the leaked documents, one finds evidence of the expansive and sometimes mercenary nature of these operations. For instance, one detailed spreadsheet reveals I-Soon’s numerous agreements with domestic law enforcement, ranging from minor tasks to extensive engagements worth hundreds of thousands of dollars. These documents not only showcase the range and pricing of the cybersecurity services offered but also proudly proclaim their effectiveness in covert data extraction, framing these digital incursions as critical components in safeguarding China’s security.

“The company listed other terrorism-related targets the company had hacked previously as evidence of their ability to perform these tasks, including targeting counterterrorism centers in Pakistan and Afghanistan,” analysts from SentinelLabs said, highlighting the dual use of these cyber capabilities for both domestic security and international espionage.

The revelations from this breach underscore the challenges faced by global tech companies and governments in protecting against state-sponsored cyber threats. The competitive landscape within China’s national security data-gathering industry is laid bare, with firms like I-Soon vying for government contracts by promising advanced cyberespionage capabilities. This leak not only exposes the intricate web of cyber operations but also the persistent challenges in safeguarding against them.

The exposure of I-Soon’s operations is likely to heighten tensions between China and the international community, especially with the countries directly impacted by the intrusions.

Latest articles

The TikTok: China’s Information Influence Operations Reaching 170 Million Americans

In a revealing interview with Fox News Digital, Michael Sobolik, a prominent China expert...

Biden Advised to Prevent China from Dumping EVs on U.S.

Senator Sherrod Brown of Ohio has called for a ban on Chinese-made electric vehicles...

China is Building Weapons for Russia

Recent U.S. intelligence assessments have shed light on China's substantial involvement in supporting Russia's...

Weak: Secretary Blinken Approaches China, Turkey and Saudi Arabia to Reason with Iran

Recent diplomatic initiatives spearheaded by US Secretary of State Antony Blinken demonstrate a serious...

More like this

The TikTok: China’s Information Influence Operations Reaching 170 Million Americans

In a revealing interview with Fox News Digital, Michael Sobolik, a prominent China expert...

Biden Advised to Prevent China from Dumping EVs on U.S.

Senator Sherrod Brown of Ohio has called for a ban on Chinese-made electric vehicles...

China is Building Weapons for Russia

Recent U.S. intelligence assessments have shed light on China's substantial involvement in supporting Russia's...