Chinese hackers charged with stealing data from NASA, IBM, and others

The Department of Justice (DOJ) is part of a government-sponsored global hacking campaign for two Chinese nationals, including information hijacking from 50 US technology companies and government agencies, including NASA's Jet Propulsion Laboratory and Goddard Space Flight center.

After the US government closed the indictment against the two on Thursday, allegations were made at the height of tensions between the United States and China. The United States recently cooperated with Canada to arrest Huawei 's CFO, one of China' s largest companies, with the willingness to engage in bilateral talks. The Chinese government demanded the release of the administration and detained three Canadian citizens. The indictment also emerged recently in a long line of accusations that the Chinese government sponsored or sought US technology theft.

"As we can see from this survey, the threat we face has never been more severe, widespread, or potentially harmful to our national security, and no country has had a wider, "The goal of China is simply to replace the United States with the world's leading superpower."

Zhu Hua and Zhang Shilong belonged to the Chinese hacking group known as the Advanced Persistent Threat 10 or APT10 in the cyber security community, according to the indictment. Hackers who have been accused have used a number of aliases, including "Godkiller", and hacking is sometimes known by other names, such as "Red Apollo", "Stone Panda" and "POTASSIUM".

Beginning in 2006, APT10 used a series of techniques to break down network defense systems, select victims and evolve to access sensitive information. The organization relied heavily on spear phishing attacks to deploy malware on victims' computers. They hid themselves with seemingly legitimate e-mail addresses and named the document in a way that seems to be relevant to the company, even though it sent a malicious-loaded message to the attached document. (DOJ describes an e-mailed case of a malicious Microsoft Word document called "12-204 Side Load Testing.doc" and an email with the subject "C17 Antenna problems" to employees of an anonymous victim company involved in helicopter manufacturing.

Malicious code provides a username and password that allows a hacker to remotely access an infected computer and record employee keystrokes. During a hacking campaign, this group has access to at least 90 computers Including seven companies involved in aviation, space and satellite technology, three telecommunications companies, the Goddard Space Flight Center (NASA) of the US Department of Energy (NASA), and the Jet Includes computers from the Jet Propulsion Laboratory The Department of Justice did not disclose the specific nature of the stolen documents,


It is unclear whether Cow was related to an internal memo on potential hacking related to "personally identifiable information" earlier this week in NASA. From around 2014, Deputy Justice Minister Rod Rosenstein, at a press conference, said APT10 "protects commercial data, including company intellectual property and other confidential business information, that storage and processing can trust." This separate part of the hacking campaign According to Reuters the bold service providers were Hewlett Packard Enterprise and IBM.

Rosenstein is a group of bona fide consulting firms, health care and biotechnology companies and " Is aiming at a hacking campaign that focuses on the Chinese government's "Made in China 2025" plan. , Which mentioned plans to expand its influence in the world economy.

The DOJ Hacking Group has been operating in several locations throughout China, but the agency has designated Tianjin as the center of APT10. Accusing China of working with Tianjin Bureau of Security, China's intelligence agency. Zhu and Zhang were charged with wire fraud and identity theft.

The United States has long been hacking in government support to steal business secrets and other confidential business information in order to blame China 's economic intelligence and the government' s boom. However, many are still under development. industry. (Perhaps China developed information from Boeing and used information gathered from hackers to replicate the C-17 aircraft used by the US Army.)

The two countries reached an agreement in 2015 that is supposed to prevent state – sponsored cyber attacks. Shortly after the armistice agreement, the Chinese government arrested a small number of people for economic espionage, and the G20 officially appeared to be holding on to the negotiations. But the agreement clearly did not prevent China from continuing such attacks, Rosenstein said on Thursday.

"It is unacceptable for China to continue to find cybercrime committed against the United States and other countries," he said. "In 2015, China promised to stop stealing trade secrets and other confidential business information through computer hacking with the aim of providing a competitive advantage for companies in the commercial sector.

Two Chinese people from China's indictment still live in China and are unlikely to be prosecuted in the US On Thursday, Rosenstein said, I hope it will come to a time when I will be able to cope with it under the control of. "Until then, we should not forget other hackers who steal our company for the obvious benefit of the Chinese industry, because there is no free passage in violation of US law because we are under the protection of foreign countries."

Please Note: This content is provided and hosted by a 3rd party server. Sometimes these servers may include advertisements. does not host or upload this material and is not responsible for the content.