Connect with us

Hi, what are you looking for?


Analysts say a massive leak reveals that a Chinese firm hacked foreign governments and activists.

This photo taken on August 4, 2020 shows Prince, a member of the hacking group Red Hacker Alliance who refused to give his real name, using his computer at their office in Dongguan, China's southern Guangdong province. From a small, dingy office tucked away in an industrial city in southern China, one of China's last "volunteer hacker" groups maintains a final outpost in its patriotic hacking war. (Photo by NICOLAS ASFOURI / AFP) / TO GO WITH CHINA-HACKING-SECURITY,FOCUS BY LAURIE CHEN - TO GO WITH China-hacking-security,FOCUS by Laurie Chen / “The erroneous mention[s] appearing in the metadata of this photo by NICOLAS ASFOURI has been modified in AFP systems in the following, we removed the HOLD HOLD HOLD in the main caption. Please immediately remove the erroneous mention[s] from all your online services and delete it (them) from your servers. If you have been authorized by AFP to distribute it (them) to third parties, please ensure that the same actions are carried out by them. Failure to promptly comply with these instructions will entail liability on your part for any continued or post notification usage. Therefore we thank you very much for all your attention and prompt action. We are sorry for the inconvenience this notification may cause and remain at your disposal for any further information you may require.”

Recently, a significant data leak surfaced on GitHub, exposing insights into China’s advancing cyber espionage capabilities. While the exact contents of the leak remain unidentified by AFP, analysts from SentinelLabs assert that it provides concrete details illustrating the sophistication of China’s cyber espionage activities.

The leaked data, attributed to a group known as I-Soon, reportedly reveals breaches of government offices across various countries, including India, Thailand, Vietnam, and South Korea. This information was corroborated by findings from Malwarebytes, although the website associated with I-Soon was inaccessible at the time of reporting.

Despite the unavailability of I-Soon’s website, archived data indicates its base in Shanghai, with additional offices scattered across China. The leaked information encompasses chat logs, presentations, and target lists, offering valuable insights into the group’s operations and strategies.

Among the services purportedly offered by I-Soon are methods for infiltrating social media accounts, remotely controlling computers, and breaching smartphone operating systems. Notably, they also offer custom hardware like a power bank capable of extracting data from devices.

Additionally, the leaked documents shed light on I-Soon’s involvement in bidding for contracts in China’s Xinjiang region, where reports of human rights abuses have emerged.

Analysts also discovered details regarding the fees hackers could earn through various cyber operations, such as a reported $55,000 for breaching a government ministry in Vietnam.

These revelations come amidst ongoing scrutiny over China’s cyber activities, with the FBI previously highlighting the country’s extensive hacking operations. However, China has consistently denied such allegations, often pointing to the United States’ own history of cyber espionage.

Pieter Arntz, a researcher at Malwarebytes, emphasized the potential implications of the leak, suggesting it could prompt shifts in international diplomacy and expose vulnerabilities in national security systems.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like


Apple is gearing up for a significant refresh of its iPad lineup in 2024, starting with the anticipated launch of the iPad Pro in...


Microsoft Teams had a major hiccup on Friday, causing disruptions and various issues for users. The problem started around 11 a.m. EST and quickly...


JetBlue Airways is considering pulling out of its $3.8 billion acquisition of Spirit Airlines following a federal judge’s blockage of the deal in response...


Tesla is pulling back nearly 200,000 cars in the U.S. over a glitch with the backup camera not kicking in when the car’s in...