The US Department of Justice has charged five Chinese with hacks targeting more than 100 companies and institutions in the US and abroad, including social media and video game companies, as well as universities and telecoms, officials said on Wednesday.
The five defendants remain fugitives, but prosecutors said that two Malaysian businessmen charged with conspiring with the alleged hackers to profit off the attacks on the video game industry were arrested in Malaysia this week and face extradition proceedings.
The indictments are part of a broader effort by the US to call out cybercrimes by China.
Photo: Reuters
US prosecutors in July accused hackers of working with the Chinese government to target companies developing vaccines for COVID-19, and of stealing hundreds of millions of dollars of intellectual property and trade secrets from companies worldwide.
Though those allegations were tailored to the pandemic, the charges announced on Wednesday — and the range of victims identified — were significantly broader, and involved attacks done both for monetary gain as well as more conventional espionage purposes.
In unsealing three related indictments, officials laid out a wide-ranging hacking scheme, targeting a variety of business sectors and academia, carried out by a China-based group known as APT41.
That group has been tracked over the past year by the firm Mandiant Threat Intelligence, which described the hackers as prolific, and successful at blending criminal and espionage operations.
The department did not directly link the hackers to the Chinese government, but officials said that the hackers were probably serving as proxies for Beijing because some of the targets, including pro-democracy activists and students at a university in Taiwan, were in line with government interests and did not appear to be about scoring a profit.
“A hacker for profit is not going to hack a pro-democracy group,” said Acting US Attorney for the District of Columbia Michael Sherwin.
In addition, one of the five defendants told a colleague that he was very close to the Chinese Ministry of State Security and would be protected “unless something very big happens,” US Deputy Attorney General Jeffrey Rosen said.
Rosen criticized the Chinese government for what he said was a failure to disrupt hacking crimes and to hold hackers accountable.
“Ideally, I would be thanking Chinese law enforcement authorities for their cooperation in the matter and the five Chinese hackers would now be in custody awaiting trial,” Rosen said. “Unfortunately, the record of recent years tells us that the Chinese Communist Party has a demonstrated history of choosing a different path, that of making China safe for their own cybercriminals, so long as they help with its goals of stealing intellectual property and stifling freedom.”
In Taipei, the Ministry of Education yesterday said that it was looking into the alleged leak of personal information involving a university.
A university was hacked in October last year and the personal information of 67,000 faculty, students and other employees was stolen, the US indictment said.
A Taiwanese energy company was also the victim of ransomware planted by the hackers on May 4, with malware preventing company officials accessing the system while it targeted a payment system in the retail sector, the indictment said.
Additional reporting by Rachel Lin
‘FORM OF PROTEST’: The German Institute Taipei said it was ‘shocked’ to see Nazi symbolism used in connection with political aims as it condemned the incident Sung Chien-liang (宋建樑), who led efforts to recall Democratic Progressive Party (DPP) Legislator Lee Kun-cheng (李坤城), was released on bail of NT$80,000 yesterday amid an outcry over a Nazi armband he wore to questioning the night before. Sung arrived at the New Taipei City District Prosecutors’ Office for questioning in a recall petition forgery case on Tuesday night wearing a red armband bearing a swastika, carrying a copy of Adolf Hitler’s Mein Kampf and giving a Nazi salute. Sung left the building at 1:15am without the armband and apparently covering the book with a coat. This is a serious international scandal and Chinese
PERSONAL DATA: The implicated KMT members allegedly compiled their petitions by copying names from party lists without the consent of the people concerned Judicial authorities searched six locations yesterday and questioned six people, including one elderly Chinese Nationalist Party (KMT) member and five KMT Youth League associates, about alleged signature forgery and fraud relating to their recall efforts against two Democratic Progressive Party (DPP) legislators. After launching a probe into alleged signature forgery and related fraud in the KMT’s recall effort, prosecutors received a number of complaints, including about one petition that had 1,748 signatures of voters whose family members said they had already passed away, and also voters who said they did not approve the use of their name, Taipei Deputy Chief Prosecutor
UNDER ATTACK: Raymond Greene said there were 412 billion malicious threats in the Asia-Pacific region in the first half of 2023, with 55 percent targeting Taiwan Taiwan not only faces military intimidation from China, but is also on the front line of global cybersecurity threats, and it is taking action to counter those attacks, President William Lai (賴清德) said yesterday. Speaking at the opening of this year’s Cybersec Expo in Taipei, the president assured foreign diplomats and exhibitors that Taiwan remained committed to strengthening its defense against cyberattacks and enhancing the resilience of its digital infrastructure. Lai referenced a report from the National Security Bureau (NSB) indicating that the Government Service Network faced an average of 2.4 million intrusion attempts daily last year, more than double the figure
COUNTERINTELLIGENCE TRAINING: The ministry said 87.5 percent of the apprehended Chinese agents were reported by service members they tried to lure into becoming spies Taiwanese organized crime, illegal money lenders, temples and civic groups are complicit in Beijing’s infiltration of the armed forces, the Ministry of National Defense (MND) said in a report yesterday. Retired service members who had been turned to Beijing’s cause mainly relied on those channels to infiltrate the Taiwanese military, according to the report to be submitted to lawmakers ahead of tomorrow’s hearing on Chinese espionage in the military. Chinese intelligence typically used blackmail, Internet-based communications, bribery or debts to loan sharks to leverage active service personnel to do its bidding, it said. China’s main goals are to collect intelligence, and develop a