theDocumentId => 747245 DoJ Charges 10 Chinese Nationals in Elaborate ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

11/1/2018
07:00 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

DoJ Charges 10 Chinese Nationals in Elaborate Cyberespionage Case

The Justice Department has indicted 10 Chinese nationals as part of an elaborate cyberespionage case that involved stealing plans for a new turbonfan engine and infecting computers with malware.

The US Justice Department has charged a group of ten Chinese nationals for participating in an elaborate cyberespionage campaign that included infecting company computers with malware in order to steal plans and designs for a newly developed turbofan engine.

Those indicted include two Chinese intelligence officers, along with several "hackers" working at their direction, as well as pair of company insiders who helped with the espionage plan, according to the DoJ.

The DoJ announced the indictments October 30, although none of those charged are in US custody.

In a statement, federal prosecutors detailed an elaborate scheme, which continued from January 2010 to May 2015, that involved spearphishing campaigns, infecting a number of different company computers with different strains of malware and using websites as watering holes to compromise other sites. Domains were also hijacked and compromised.

(Source: iStock)
(Source: iStock)

Some of the malware included Sakula, a Remote Acccess Trojan (RAT) that has been active since at least 2012.

At the heart of the indicted are charges against two Chinese intelligence officers, Zha Rong and Chai Meng, who the Justice Department claims are part of the Jiangsu Province Ministry of State Security (JSSD), which is headquartered in Nanjing.

The JSSD is a provincial foreign intelligence arm of the People's Republic of China's Ministry of State Security (MSS), according to the indictment. The MSS and the JSSD are "primarily responsible for domestic counter-intelligence, non-military foreign intelligence, and aspects of political and domestic security," according to the Justice Department.

The espionage campaign involved the two intelligence officers, along with a group of hackers -- Zhang-Gui, Liu Chunliang, Gao Hong Kun, Zhuang Xiaowei, and Ma Zhiqi -- who attempted to steal the technology and plans for a turbonfan, which was being developed by a French company with help from a US firm.

The French firm had a secondary office in Suzhou, China, and the intelligence officer recruiter two insiders, Gu Gen and Tian Xi, to help with the espionage campaign. At the same time, the hackers in the group were able to penetrate companies in Arizona, Massachusetts and Oregon that were supplying parts for the engine.

The indictment indicates that the group was helping the government of China to stay competitive. "At the time of the intrusions, a Chinese state-owned aerospace company was working to develop a comparable engine for use in commercial aircraft manufactured in China and elsewhere," according to the DoJ statement.

The espionage continued for several years until the Oregon company found the malware, cleansed it from its computers and systems and alerted authorities. The Justice Department and the FBI then began investigating the case, which took more than three years to complete

While it's doubtful whether any of the individuals mentioned in Tuesday's indictment will be brought to the US to face charges, the Justice Department recently announced the arrest of another Chinese spy, who was detained in Belgium and has now been sent to the US to face trial.

In an email, Sean Sullivan, a security advisor at cybersecurity firm F-Secure, noted that these indictments come as the US and China are engaged in a trade war and these allegation might serve as a way for the US to gain leverage over China as negotiations continue.

Sullivan also noted that China's spying efforts have been ramped up as of late.

"It's also interesting to see that the Chinese Ministry of State Security (MSS) have combined human intelligence and cyber espionage together, which shows that the infection vector doesn't always need to be virtual -- it can also be physical," Sullivan wrote.

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34432
PUBLISHED: 2021-07-27
In Eclipse Mosquitto versions 2.07 and earlier, the server will crash if the client tries to send a PUBLISH packet with topic length = 0.
CVE-2021-20399
PUBLISHED: 2021-07-27
IBM Qradar SIEM 7.3.0 to 7.3.3 Patch 8 and 7.4.0 to 7.4.3 GA is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 196073.
CVE-2021-20562
PUBLISHED: 2021-07-27
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_3 and 6.1.0.0 through 6.1.0.2 vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclos...
CVE-2020-18428
PUBLISHED: 2021-07-26
tinyexr commit 0.9.5 was discovered to contain an array index error in the tinyexr::SaveEXR component, which can lead to a denial of service (DOS).
CVE-2020-18430
PUBLISHED: 2021-07-26
tinyexr 0.9.5 was discovered to contain an array index error in the tinyexr::DecodeEXRImage component, which can lead to a denial of service (DOS).