Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Things you don't want to miss on October 20th

May 25, 2025

Save $900 + 90% from 2 tickets to destroy 2025 in the last 24 hours

May 25, 2025

Naukri has published the recruiter's email address, researchers say

May 24, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Digg Founder Kevin Rose offers to buy a pocket from Mozilla

    May 23, 2025

    Bluesky begins to check for “notable” users

    May 22, 2025

    Mozilla shuts down its Read-It-Later app pocket

    May 22, 2025

    Opening a Social Web Browser Surf makes it easy for anyone to create custom feeds

    May 22, 2025

    Anthropic's new Claude4 AI model can be inferred in many steps

    May 22, 2025
  • Crypto

    Save $900 + 90% from 2 tickets to destroy 2025 in the last 24 hours

    May 25, 2025

    Only 3 days left to save up to $900 to destroy the 2025 pass

    May 23, 2025

    Starting from up to $900 from Ticep, 90% off +1 in 2025

    May 22, 2025

    Early savings for 2025 will end on May 25th

    May 21, 2025

    Coinbase says its data breach will affect at least 69,000 customers

    May 21, 2025
  • Security

    Naukri has published the recruiter's email address, researchers say

    May 24, 2025

    Apple CEO reportedly urged the Texas governor to abandon the online child safety bill

    May 23, 2025

    Artemis Seaford and Ion Stoica cover the ethical crisis in their sessions: AI

    May 23, 2025

    Mysterious hacking group Careto was run by the Spanish government, sources say

    May 23, 2025

    Microsoft says Lumma Password Stealer Malware found on 394,000 Windows PCs

    May 22, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Things you don't want to miss on October 20th

    May 25, 2025

    Khosla ventures among VCS experimenting with AI injection rollups in mature companies

    May 23, 2025

    Klarna CEO and Sutter Hill wins lap after Jony Ive's Openai deal

    May 22, 2025

    Wild story of how Moxxie-led Intestinal Toilet Startup Sloan was registered as a gut toilet startup throne

    May 22, 2025

    Submitted submission raises $17 million to automate tax preparation dr voyages

    May 21, 2025
TechBrunchTechBrunch

Spyware leak reveals 'first of its kind' inside Chinese government hacking operation

TechBrunchBy TechBrunchFebruary 23, 20245 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


over the weekendsomeone posted a cache of files and documents that appeared to be stolen from Chinese government hacking contractor I-Soon.

The leak gave cybersecurity researchers and hostile governments an unprecedented opportunity to peer behind the scenes at a Chinese government hacking operation facilitated by private contractors.

Similar to the hack-and-leak operation that targeted Italian spyware maker Hacking Team in 2015, the I-Soon leak includes company documents and internal communications, and reveals that I-Soon has been linked to India, Kazakhstan, India, and Kazakhstan. , indicating that it is suspected of being involved in hacking of Indian companies and government agencies. Malaysia, Pakistan, Taiwan, Thailand etc.

The leaked files were posted to code-sharing site GitHub on Friday. Since then, observers of Chinese hacking activity have been eagerly viewing the files.

“This represents the most significant data breach involving a company suspected of providing cyber espionage and targeted intrusion services to Chinese security services,” said John, threat intelligence analyst at cybersecurity firm Recorded Future.・Mr. Condra stated.

For John Hultquist, chief analyst at Google's Mandiant, the breach is “small in scope, but deep-rooted.” “Rarely do we have such unfettered access to the inner workings of an intelligence operation.”

“This breach is the first to reveal the inner workings of a nation-state hacking contractor,” Dakota Carey, an analyst at cybersecurity firm Sentinel One, wrote in a blog post.

Mathieu Tartare, a malware researcher at ESET, also said the breach “could help link some of the breaches observed by threat intelligence analysts to I-Soon.”

One of the first people to investigate the breach was a threat intelligence researcher from Taiwan known as Azaka. On Sunday, Azaka posted a long thread on X (formerly Twitter) in which he analyzed some documents and files, which appear to date back to 2022. Researchers highlighted spy software developed by I-Soon for Windows, Mac, iPhone, and Android devices. It also includes hardware hacking devices designed to be used in real-world situations that can crack Wi-Fi passwords, track Wi-Fi devices, and jam Wi-Fi signals. will appear.

Lee Soon's "A WiFi Near Field Attack System is a device for hacking Wi-Fi networks that disguises itself as an external battery.

I-Soon's “WiFi Near Field Attack System” is a device that hacks Wi-Fi networks disguised as an external battery. (screenshot: Azaka)

“We researchers have finally confirmed that this is how things work over there, and that APT groups work pretty much like all of us regular workers ( “The scale is pretty large, and there's a lucrative market for compromising large government networks.” Azaka told TechCrunch. APT (Advanced Persistent Threat) is a hacking group that usually has government support.

According to researchers' analysis, the documents show that Yisun served in China's Ministry of Public Security, Ministry of State Security, and China's Army and Navy. I-Soon also markets and sells its services to local law enforcement agencies across China to target ethnic minorities such as Tibetans and Uyghurs, a Muslim community living in western China's Xinjiang Uighur Autonomous Region. did.

This document connects I-Soon and APT41. APT41 is a Chinese government hacking group that has reportedly been active since 2012 and targets organizations across a variety of industries in the healthcare, communications, technology, and video game industries around the world.

The IP addresses found in the I-Soon leak also hosted phishing sites that digital rights organization Citizen Lab saw used against Tibetans in a 2019 hacking campaign. At the time, Citizen Lab researchers named the hacker group “Poison Carp.”

Like Azaka and others, they also discovered chat logs between Yisun employees and management, in which employees talked about gambling, a popular Chinese tile-based game. Some of the content was very mundane, such as playing mahjong.

Carey highlighted documents and chats showing how much or how little Isun employees were paid.

inquiry

Do you know more about I-Soon and the Chinese government hack? Securely contact Lorenzo Franceschi-Bicchierai from your non-work device on Signal (+1 917 257 1382) or on Telegram, Keybase and Wire @lorenzofb or email You can contact me. You can also contact TechCrunch via SecureDrop.

“They are receiving $55,000.” [US] — $2,024 — that’s not a lot of money for a target like that to hack Vietnam’s Ministry of Economy,” Carey told TechCrunch. “It makes you think about how low-cost it is for China to conduct operations against high-value targets. And what does that say about the nature of the organization's security?”

What the leak shows, Carey said, is that researchers and cybersecurity companies need to carefully consider the potential future actions of mercenary hacker groups based on past activity. .

“This shows that a threat actor's previous targeting behavior, especially when they are Chinese government contractors, is not indicative of future targets,” Carey said. “So it's not helpful to look at this organization and think, 'Oh, they just hacked the healthcare industry, or they hacked X, Y, and Z industries, and they hacked these countries.' what is it responding to? [government] Requested by the agency. And those agencies may request something different. They may get deals with new bureaus and new locations. ”

The Chinese embassy in Washington, D.C., did not respond to a request for comment.

An email sent to I-Soon's support inbox went unanswered. Two anonymous I-Soon employees told The Associated Press that the company held a meeting on Wednesday and advised employees that the breach would not impact business and to “continue to operate as usual.” He said that he told him.

At this time, there is no information about who posted the leaked documents or files, and GitHub recently removed the leaked cache from its platform. However, several researchers agree that the accounts are more likely to come from disgruntled current or former employees.

“The people who put this leak together created a table of contents. And what the leak is about is employees complaining about low pay and the company's financial situation,” Cary said. “This leak is structured to embarrass the company.”





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Naukri has published the recruiter's email address, researchers say

May 24, 2025

Apple CEO reportedly urged the Texas governor to abandon the online child safety bill

May 23, 2025

Artemis Seaford and Ion Stoica cover the ethical crisis in their sessions: AI

May 23, 2025

Mysterious hacking group Careto was run by the Spanish government, sources say

May 23, 2025

Microsoft says Lumma Password Stealer Malware found on 394,000 Windows PCs

May 22, 2025

Signal's new Windows update prevents the system from capturing screenshots of chat

May 22, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Things you don't want to miss on October 20th

May 25, 2025

Save $900 + 90% from 2 tickets to destroy 2025 in the last 24 hours

May 25, 2025

Naukri has published the recruiter's email address, researchers say

May 24, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.