close
close

The Chinese government using independent hackers to compromise computer networks globally, warns FBI

The Chinese government using independent hackers to compromise computer networks globally, warns FBI

The Chinese government uses independent hackers and information security companies to compromise computer networks around the world, FBI officials said in a public warning issued on Wednesday.

The warning comes as the indictments were unsafe in New York and Washington on Wednesday against a dozens of Chinese relevant accused of hacking in American computer networks and sold data stolen from the Chinese government.

“The Department of Justice will endlessly follow those who threaten our Cibersurita by stealing our government and our people,” said Sue Bai, head of the National Security Department of the Department of Justice, in a statement on Wednesday.

“We exhibit Chinese government agencies that direct and encourage undiscriminated and reckless attacks against computers and networks around the world, as well as companies that allow individual hackers they have unleashed,” Bai said. “We will continue to fight to dismantle this ecosystem of cyber mercenaries and to protect our national security.”

The ecosystem of China information security companies “bloom”, because China’s government agencies “argue” the information security companies “through the tasks of companies that advert the legitimate cyber security services to use their expertise to obtain unauthorized access to the victims’ networks to collect the information services in China,” FBI said.

China government agencies involved in alleged cyber security threats include the China’s primary information service, the Ministry of State Security and the China Internal Police Agency, the Ministry of Public Security, according to the FBI.

The southern district of New York On Wednesday, an indictment against eight employees of Anxun Information Technology Co., Ltd., Aka I-Soon, a China-based information company and two of China’s internal police officers, who would have directed the I-Soon activities “in the Chinese Government’s job”.

“I-Soon has been a key player” in the ecosystem of the information security company in China in the last decade, said FBI. The company worked with at least 43 by the Ministry of State Security or the offices of the Ministry of Public Security from 31 provinces and municipalities in China.

The defendant I-Soon Hackers would have sold stolen data to Chinese government agencies “from a multitude of victims, to include US government critics and Chinese dissidents, a US news organization, a large US religious organization, several Asian governments and Federal and State government agents,” the FBI officials said.

“I-Soon has sold information to China’s intelligence and security services to suppress free expression and democratic processes around the world, and target groups considered a threat to the Chinese government,” officials said.

I-Soon has also sold platforms to the main information service in China and the customers of the internal police agency “for their own hacking efforts,” officials said.

I-Soon activities are publicly followed as aquatic panda, Red Alpha, Red Hotel, Typhoon Charcoal, Red Scylla, Hassium, Chrom and Tag-22, according to the FBI.

“This ecosystem of Infosec companies and independent hackers allow and encourage undiscriminated cyber activity, while offering the Chinese government a plausible layer,” FBI officials said in their statement.

Also, on Wednesday, the Federal Court of Washington, DC described two indential hackers Yin Kecheng and Zhou Shuai, who are accused of maintaining links with I-Soon and the Chinese government.

Since 2011, Yin and Zhou have worked in the ecosystem of the information security company in China “and have been enriched by selling the US stolen information to the Chinese government,” the prosecutors say.

Zhou served for a period of time in the I-Soon strategic consulting division.

Yin, known in Chinese hacking circles for his prolific orientation of American entities, explained to an associate in 2013 that he wanted to “confuse with American military” and “break a big target”, in the hope that revenues from the sale of stolen data from the US will be sufficient to buy a car.

At least once, Yin compromised the sensitive data he handed over to Zhou, who associated with an I-Soon employee to sell stolen data, prosecutors said.

The activities of Yin and Zhou are publicly followed as APT27, the 3390 threat group, the Bronze Union, Panda Emissaric, Lucky Mouse, Iron Tiger, UTA0178, UNC 5221 and Typhoon Silk, officials said.

Anyone suspects to be a victim of malicious cyber activity by groups associated with the Chinese www.ic3.gov as soon as possible.

This is a developing story. Check for updates as more information becomes available.

Download Free Boston news app 25 To break the news alerts.

Follow Boston 25 News On Facebook and Twitter. | Follow the Boston news now 25