Chinese Hackers Accused of Stealing Data

Chinese Hackers Accused of Stealing Data

The Department of Justice has accused two Chinese hackers of stealing valuable data, personal information and trade secrets from hundreds of organizations around the world, including companies that are working to develop coronavirus treatments and vaccines. The suspects were identified as Li Xiaoyu, 34, and Dong Jiazhi, 33, both of whom are believed to be in China.

An 11-count indictment describes a sophisticated scheme that lasted more than 10 years and targeted a variety of industries in the United States, Europe and Asia. Federal prosecutors said they often snooped on companies for own financial gain, but also worked on behalf of the Chinese government.

Several U.S. officials disparaged the Chinese government for allegedly deploying malicious cyber tactics to steal intellectual property from other countries. It was not immediately clear, however, whether the suspects successfully obtained any coronavirus research.

“China has now taken its place, alongside Russia, Iran and North Korea, in that shameful club of nations that provide a safe haven for cyber criminals in exchange for those criminals being ‘on call’ to work for the benefit of the state, here to feed the Chinese Communist party’s insatiable hunger for American and other non-Chinese companies’ hard-earned intellectual property, including COVID-19 research,” said Assistant Attorney General for National Security John Demers.

In a first of its kind move, the United States has criminally charged foreign hackers with targeting companies working to fight COVID-19, even as authorities in North America and the U.K. last week accused a hacking group with ties to the Russian government with trying to steal research on the virus.

The Justice Department said Li and Dong were exploiting publicly known software vulnerabilities in popular web applications. They would then install credential-stealing software on those networks to remotely execute commands on victims’ computers. The pair targeted industries such as high-tech manufacturing, medical device engineering, solar energy, defense, pharmaceuticals, and business, educational and gaming software, authorities said. Other countries targeted were Australia, Belgium, Germany, Japan, Spain, South Korea and the United Kingdom.

The two suspects are charged with unauthorized access, conspiracy to access without authorization and damage computers, conspiracy to commit theft of trade secrets; conspiracy to commit wire fraud and aggravated identity theft.

Featured

  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX
  • Bringing New Goods to Market

    The 2024 version of GSX brought with it a race to outrun incoming hurricane Helene. With it’s eye on Orlando, it seems to have shifted and those security professionals still in Orlando now have a fighting chance to get out town. Read Now

    • Industry Events
    • GSX
  • Live from GSX 2024: Day 2 Recap

    Day 2 was another winner at GSX 2024 in Orlando. Aisles and booths were packed with attendees looking at some of the new and latest security technology. Remember to follow the GSX Live page from Security Today, as well as SecurToday on X and Security Today on LinkedIn to find out more about what’s happening on the show floor during tomorrow’s final day. Here’s what was happening with all four of our partners during the event on Tuesday. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3