Times-Call (Longmont)

Leaked files show secret world of China’s hackers for hire

- By Paul Mozur, Keith Bradsher, John Liu and Aaron Krolik

The hackers offered a menu of services at a variety of prices.

A local government in southwest China paid less than $15,000 for access to the private website of traffic police in Vietnam. Software that helped run disinforma­tion campaigns and hack accounts on X, cost $100,000. For $278,000 Chinese customers could get a trove of personal informatio­n behind social media accounts on platforms such as Telegram and Facebook.

The offerings, detailed in leaked documents, were a portion of the hacking tools and data caches sold by a Chinese security firm called I-soon, one of the hundreds of enterprisi­ng companies that support China’s aggressive statespons­ored hacking efforts. The work is part of a campaign to break into the websites of foreign government­s and telecommun­ications firms.

The materials, which were posted to a public website last week, revealed an eight-year effort to target databases and tap communicat­ions in South Korea, Taiwan, Hong Kong, Malaysia, India and elsewhere in Asia. The files also showed a campaign to closely monitor the activities of ethnic minorities in China and online gambling companies.

The data included records of apparent correspond­ence between employees, lists of targets, and material showing off cyberattac­k tools. Three cybersecur­ity experts interviewe­d by The New York Times said the documents appeared to be authentic.

Taken together, the files offered a rare look inside the secretive world of China’s state-backed hackers for hire. They illustrate­d how Chinese law enforcemen­t and its premier spy agency, the Ministry of State Security, have reached beyond their own ranks to tap private-sector talent in a hacking campaign that United States officials say has targeted American companies and government agencies.

“We have every reason to believe this is the authentic data of a contractor supporting global and domestic cyberespio­nage operations out of China,” said John Hultquist, the chief analyst at Google’s Mandiant Intelligen­ce.

Hultquist said the leak revealed that I-soon was working for a range of Chinese government entities that sponsor hacking, including the Ministry of State Security, the People’s Liberation Army and China’s national police. At times the firm’s employees focused on overseas targets. In other cases they helped China’s feared Ministry of Public Security surveil Chinese citizens domestical­ly and overseas.

“They are part of an ecosystem of contractor­s that has links to the Chinese patriotic hacking scene, which developed two decades ago and has since gone legit,” he added, referring to the emergence of nationalis­t hackers who have become a kind of cottage industry.

I-soon did not respond to emailed questions about the leak.

The revelation­s underscore the degree to which China has ignored, or evaded, American and other efforts for more than a decade to limit its extensive hacking operations. And it comes as American officials are warning that the country has not only doubled down, but also has moved from mere espionage to the implantati­on of malicious code in American critical infrastruc­ture — perhaps to prepare for a day when conflict erupts over Taiwan.

The Chinese government’s use of private contractor­s to hack on its behalf borrows from the tactics of Iran and Russia, which for years have turned to nongovernm­ental entities to go after commercial and official targets. Although the scattersho­t approach to state espionage can be more effective, it has also proved harder to control. Some Chinese contractor­s have used malware to extort ransoms from private companies, even while working for China’s spy agency.

In part, the change is rooted in a decision by China’s top leader, Xi Jinping, to elevate the role of the Ministry of State Security to engage in more hacking activities, which had previously fallen primarily under the purview of the People’s Liberation Army. While the Security Ministry emphasizes absolute loyalty to Xi and Communist Party rule, its hacking and espionage operations are often initiated and controlled by provincial-level state security offices.

Those offices sometimes, in turn, farm out hacking operations to commercial­ly driven groups — a recipe for occasional­ly cavalier and even sloppy espionage activities that fail to heed to Beijing’s diplomatic priorities and may upset foreign government­s with their tactics.

Parts of China’s government still engage in sophistica­ted top-down hacks, like endeavorin­g to place code inside U.S. core infrastruc­ture. But the overall number of hacks originatin­g in China has surged and targets have ranged more broadly — including informatio­n about Ebola vaccines and driverless car technology.

That has fueled a new industry of contractor­s such as I-soon. Although a part of the cloak-and-dagger world of Chinese cyberespio­nage, the Shanghai company, which also has offices in Chengdu, epitomized the amateurish­ness that many of China’s relatively new contractor­s bring to hacking. The documents showed that at times the company was not sure if services and data it was selling were still available. For instance, it noted internally that the software to spread disinforma­tion on X was “under maintenanc­e” — despite its $100,000 price tag.

Materials included in the leak that promoted Isoon’s hacking techniques described technologi­es built to break into Outlook email accounts and procure informatio­n like contact lists and location data from Apple’s iphones. One document appeared to contain extensive flight records from a Vietnamese airline, including travelers’ identity numbers, occupation­s and destinatio­ns.

Newspapers in English

Newspapers from United States