Chinese Hackers Accused of Stealing Data

Chinese Hackers Accused of Stealing Data

The Department of Justice has accused two Chinese hackers of stealing valuable data, personal information and trade secrets from hundreds of organizations around the world, including companies that are working to develop coronavirus treatments and vaccines. The suspects were identified as Li Xiaoyu, 34, and Dong Jiazhi, 33, both of whom are believed to be in China.

An 11-count indictment describes a sophisticated scheme that lasted more than 10 years and targeted a variety of industries in the United States, Europe and Asia. Federal prosecutors said they often snooped on companies for own financial gain, but also worked on behalf of the Chinese government.

Several U.S. officials disparaged the Chinese government for allegedly deploying malicious cyber tactics to steal intellectual property from other countries. It was not immediately clear, however, whether the suspects successfully obtained any coronavirus research.

“China has now taken its place, alongside Russia, Iran and North Korea, in that shameful club of nations that provide a safe haven for cyber criminals in exchange for those criminals being ‘on call’ to work for the benefit of the state, here to feed the Chinese Communist party’s insatiable hunger for American and other non-Chinese companies’ hard-earned intellectual property, including COVID-19 research,” said Assistant Attorney General for National Security John Demers.

In a first of its kind move, the United States has criminally charged foreign hackers with targeting companies working to fight COVID-19, even as authorities in North America and the U.K. last week accused a hacking group with ties to the Russian government with trying to steal research on the virus.

The Justice Department said Li and Dong were exploiting publicly known software vulnerabilities in popular web applications. They would then install credential-stealing software on those networks to remotely execute commands on victims’ computers. The pair targeted industries such as high-tech manufacturing, medical device engineering, solar energy, defense, pharmaceuticals, and business, educational and gaming software, authorities said. Other countries targeted were Australia, Belgium, Germany, Japan, Spain, South Korea and the United Kingdom.

The two suspects are charged with unauthorized access, conspiracy to access without authorization and damage computers, conspiracy to commit theft of trade secrets; conspiracy to commit wire fraud and aggravated identity theft.

Featured

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities