Massive Cyber Attack: 12 Chinese Hackers Indicted for Breaching US Treasury and More

Watch this related video:

In a shocking announcement, the Department of Justice (DOJ) has indicted 12 Chinese nationals for their involvement in a string of cyber attacks dating back to 2013. The attacks targeted over 100 US organizations, including the Treasury, and have been linked to the Chinese government.

The DOJ has accused these individuals of hacking into sensitive systems either independently or under the direction of the Ministry of Public Security (MPS) and China’s Ministry of State Security (MSS). Among the accused are two MPS officers, eight employees of a “private” Chinese company called i-Soon, and two members of the infamous APT27, also known as Silk Typhoon.

According to the indictment, i-Soon had the capability to hack into popular platforms such as Gmail, Microsoft Outlook, Twitter, and X, which they allegedly used to monitor public opinion overseas. This was part of their “Public Opinion Guidance and Control Platform,” or what the DOJ calls “cyber-enabled transnational repression.”

The remaining two accused, Yin Kecheng and Zhou Shuai, were members of APT27 and were responsible for targeting various organizations, including healthcare systems, universities, and technology companies. Recent research from Microsoft has linked the group to attacks on IT systems using management software, which is similar to the method used in the Treasury hack reported in December 2020.

But what was the motivation behind these attacks? The answer is simple: money. The DOJ alleges that the MPS and MSS paid large sums of money for the stolen data. In fact, the i-Soon group alone generated tens of millions of dollars through their involvement in China’s “hacker-for-hire” ecosystem. And they didn’t just work for the government. They also sold stolen data to at least 43 different bureaus of the MSS or MPS in 31 different provinces and municipalities in China.

The scope of these attacks is staggering, with victims including major US organizations such as the Department of Commerce, the Defense Intelligence Agency, and even two New York newspapers. The damages caused by these attacks are estimated to be in the millions of dollars.

What’s more alarming is that none of the accused are currently in custody, according to the DOJ. To combat this threat, the US government is offering a reward of up to $10 million for information leading to the identification of those involved in directing or carrying out the attacks carried out by i-Soon, and up to $2 million each for Yin Kecheng and Zhou Shuai.

This cyber attack not only poses a threat to the organizations and their data but also to individuals like you and me. It highlights the need for increased cybersecurity measures, especially for those handling sensitive data. As individuals, we must be vigilant and cautious of suspicious emails and activities that may put our personal information at risk.

In the face of this cybercrime, it is also essential to understand the larger implications. This attack is just the latest in a long line of cyber espionage and intellectual property theft carried out by the Chinese government. It raises concerns about their intentions and capabilities in the digital world and may have far-reaching consequences for international relations and national security.

With the rise of technology and the increasing importance of cyberspace in our daily lives, the threat of cyber attacks is only going to grow. It is crucial to stay updated on the latest cybersecurity trends and take necessary precautions to protect ourselves and our data.

In conclusion, the indictment of 12 Chinese hackers for their involvement in a massive cyber attack on US organizations is a wake-up call for individuals and governments alike. It serves as a reminder of the ever-evolving threat landscape and the need for constant vigilance and proactive measures to safeguard against cyber attacks. Let us strive towards a safer and more secure digital world.

Leave a Reply

Your email address will not be published. Required fields are marked *