Conversation

DOJ Press Release: Seven Defendants Operated as Part of the APT31 Hacking Group in Support of China’s Ministry of State Security’s Transnational Repression, Economic Espionage and Foreign Intelligence Objectives 🔗 https://www.justice.gov/usao-edny/pr/seven-hackers-associated-chinese-government-charged-computer-intrusions-targeting

2
0
0

See related U.S. Treasury press release: Treasury Sanctions China-Linked Hackers for Targeting U.S. Critical Infrastructure. Wuhan Xiaoruizhi Science and Technology Company, Limited (Wuhan XRZ) is a Wuhan, China-based Ministry of State Security (MSS) front company that has served as cover for multiple malicious cyber operations. 🔗 https://home.treasury.gov/news/press-releases/jy2205

1
0
0

See related NCSC-UK press release: UK calls out China state-affiliated actors for malicious cyber targeting of UK democratic institutions and parliamentarians. "APT31, a China state-affiliated actor, was almost certainly responsible for targeting UK parliamentarians’ emails in 2021.
" 🔗 https://www.ncsc.gov.uk/news/china-state-affiliated-actors-target-uk-democratic-institutions-parliamentarians

0
0
0

U.S. State Department Rewards for Justice (RFJ) program is offering a reward of up to $10 million for information leading to the identification or location of APT31, a collection of Chinese state-sponsored intelligence officers, contract hackers, and support staff that conduct malicious cyber operations on behalf of the Hubei State Security Department (HSSD), a provincial branch of the Ministry of State Security. 🔗 https://rewardsforjustice.net/rewards/apt31-wuhan-xiaoruizhi-science-technology-company-ltd/

3
0
0

@simontsui

Perhaps the US / UK goverment should be more concerened with this and other similar groups than Julian Assange,

Unless the idea is to make an example out of Julian Assange, something the UK won't let happen as the extradition criteria includes NOT applying the death penalty.

1
0
0

@zleap The U.S. Department of Justice handles hundreds of criminal cases simultaneously. Assange was charged with (Case No. 1:18-cr-111):

  1. Conspiracy to Obtain, Receive, and Disclose National Defense Information
  2. Unauthorized Obtaining of National Defense Information
  3. Unauthorized Obtaining of National Defense Information
  4. Unauthorized Obtaining of National Defense Information
  5. Attempted Unauthorized Obtaining and Receiving of National Defense Information
  6. Unauthorized Obtaining and Receiving of National Defense Information
  7. Unauthorized Obtaining and Receiving of National Defense Information
  8. Unauthorized Obtaining and Receiving of National Defense Information
  9. Unauthorized Disclosure of National Defense Information
  10. Unauthorized Disclosure of National Defense Information
  11. Unauthorized Disclosure of National Defense Information
  12. Unauthorized Disclosure of National Defense Information
  13. Unauthorized Disclosure of National Defense Information
  14. Unauthorized Disclosure of National Defense Information
  15. Unauthorized Disclosure of National Defense Information
  16. Unauthorized Disclosure of National Defense Information
  17. Unauthorized Disclosure of National Defense Information
  18. Conspiracy to Commit Computer Intrusion

He is considered innocent until proven guilty.

0
0
0

BBC:China hits out at US and UK over cyber hack claims 🔗 https://www.bbc.com/news/world-asia-china-68655786 China's Foreign Ministry spokesperson Lin Jian:

"We urge the US and UK to stop politicising cyber security issues. Stop smearing China and stop imposing unilateral sanctions on China. Stop their cyber attack against China. The Chinese side has already made technical clarifications and response to the APT 31-related Information submitted by the UK side, which made clear that the evidence provided by the UK was inadequate. Unfortunately, we haven't heard from the UK side."

3
0
0

@simontsui bla bla bla blaaaa blalah lalalal bla bla

0
0
0

@simontsui gotta love how the authoritarian response is always "no, *you* are!"

0
0
0

Continuing with the dogpile on APT31: Finland's National Bureau of Investigation published a press release into the ongoing criminal investigation into APT31's connection with the hacking of their Parliament between autumn 2020 and early 2021."These connections have now been confirmed by the investigation, and the police have also identified one suspect." 🔗 https://poliisi.fi/en/-/investigation-into-hacking-of-parliament-s-information-systems-has-been-ongoing

1
0
0

New Zealand shares their own Chinese problems: “The GCSB’s National Cyber Security Centre (NCSC) completed a robust technical assessment following a compromise of the Parliamentary Counsel Office and the Parliamentary Service in 2021, and has attributed this activity to a PRC state-sponsored group known as APT40" 🔗 https://www.beehive.govt.nz/release/parliamentary-network-breached-prc

APT40—aka BRONZE MOHAWK, FEVERDREAM, G0065, Gadolinium, GreenCrash, Hellsing, Kryptonite Panda, Leviathan, MUDCARP, Periscope, Temp.Periscope, and Temp.Jumper is a Chinese Advanced Persistent Threat (APT) group associated with China’s MSS Hainan State Security Department. On July 19, 2021, the U.S. Department of Justice (DOJ) unsealed an indictment against four APT40 cyber actors for their illicit computer network exploitation (CNE) activities via front company Hainan Xiandun Technology Development Company (Hainan Xiandun).

0
0
0