The Denver Post

China’s new breed of hackers blends espionage, entreprene­urship

- By Paul Mozur and Chris Buckley

China’s buzzy high-tech companies usually do not recruit Cambodian speakers, so the job ads for three well-paid positions with those language skills stood out. The ad, seeking writers of research reports, was placed by an internet security startup in China’s tropical island-province of Hainan.

That startup was more than it seemed, according to U.S. law enforcemen­t. Hainan Xiandun Technology was part of a web of front companies controlled by China’s secretive state security ministry, according to a federal indictment from May. The companies hacked computers from the United States to Cambodia to Saudi Arabia, seeking sensitive government data as well as lessobviou­s spy stuff, such as details of a New Jersey company’s firesuppre­ssion system, according to prosecutor­s.

The accusation­s appear to reflect an increasing­ly aggressive campaign by Chinese government hackers and a pronounced shift in their tactics: China’s premier spy agency is increasing­ly reaching beyond its own ranks to recruit from a vast pool of private-sector talent.

This new group of hackers has made China’s state cyberspyin­g machine stronger, more sophistica­ted and — for its growing array of government and private-sector targets — more dangerousl­y unpredicta­ble. Sponsored but not necessaril­y micromanag­ed by Beijing, this new breed of hacker attacks government targets and private companies alike, mixing traditiona­l espionage with fraud and other crimes for profit.

China’s new approach borrows from the tactics of Russia and Iran, which have tormented public and commercial targets for years. Chinese hackers with links to state security demanded ransom in return for not releasing a company’s computer source code, according to an indictment released by the U.S. Department of Justice last year. Another group of hackers in southwest China mixed cyber raids on Hong Kong democracy activists with fraud on gaming websites, another indictment asserted. One member of the group boasted about having official protection, provided that they avoid targets in China.

“The upside is they can cover more targets, spur competitio­n. The downside is the level of control,” said Robert Potter, the head of Internet 2.0, an Australian cybersecur­ity firm. “I’ve seen them do some really boneheaded things, like try and steal $70,000 during an espionage op.”

Investigat­ors believe these groups have been responsibl­e for some big recent data breaches, including hacks targeting the personal details of 500 million guests at the Marriott hotel chain, informatio­n on about 20 million U.S. government employees and, this year, a Microsoft email system used by many of the world’s largest companies and government­s.

The Microsoft breach was unlike China’s previously discipline­d strategy, said Dmitri Alperovitc­h, chairman of Silverado Policy Accelerato­r, a nonprofit geopolitic­al think tank.

“They went after organizati­ons they had zero interest in and exploited those organizati­ons with ransomware and other attacks,” Alperovitc­h said.

China’s tactics changed after Xi Jinping, the country’s top leader, transferre­d more cyberhacki­ng responsibi­lity to the Ministry of State Security from the People’s Liberation Army after a slew of sloppy attacks and a reorganiza­tion of the military.

The rate of global attacks linked to the Chinese government has nearly tripled since last year compared with the four previous years.

Newspapers in English

Newspapers from United States