
Chinese hackers are getting bigger, better and stealthier
China's power is growing rapidly every year. From warships to missiles, the country is churning out hardware at an extraordinary rate. In the unseen, online world, it is making similar leaps. On March 4th America's Justice Department charged eight Chinese nationals with large-scale hacking of government agencies, news outlets and dissidents in America and around the world, on behalf of i-Soon, a Chinese company, at the direction of the Chinese government. It also indicted two officials who it said 'directed the hacks".
These instances are the tip of a vast iceberg. Over the past decade China's hacking programme has grown rapidly, to the point that in 2023 Christopher Wray, then the fbi director, noted it was larger than that of every other major nation combined. China's growing heft and sophistication have yielded success in three main areas.
The first is political espionage, linked primarily to the Ministry of State Security (mss), China's foreign-intelligence service. Last year it emerged that one group of Chinese hackers, dubbed Salt Typhoon, had breached at least nine American phone companies, giving them access to the calls and messages of important officials. Ciaran Martin, who led Britain's cyber-defence agency from 2016 to 2020, compares it to the revelations in 2013 by Edward Snowden, a government contractor, that American spy agencies were conducting cyber-espionage on a huge scale. China was 'gaining vast access to the nation's communications via a strategic spying operation of breathtaking audacity," he says.
A second is in domains of little espionage value: hacking that lays the groundwork for sabotage in moments of crisis or war. These efforts are led by the People's Liberation Army (pla), China's armed forces. In 2023 it became apparent that a pla-linked hacking group known as Volt Typhoon had, over several years, burrowed into an extraordinary range of American critical infrastructure, from ports to factories to water-treatment plants, across the continental United States and in strategic American territories such as Guam.
All of that builds on a third type of hacking: the industrial-scale theft of intellectual property. In 2013 Mandiant, a cyber-threat intelligence firm, which is now part of Google, made waves when it exposed 'apt1", the label for a group of hackers linked to the pla. apt1 was not focused on stealing political secrets or turning off power grids but on stealing blueprints, manufacturing processes and business plans from American firms. A year later America's government took the then unprecedented step of indicting five pla hackers for this activity. Keith Alexander, a former head of the National Security Agency (nsa), America's signals-intelligence service, described this as 'the greatest transfer of wealth in history".
That period ended with a partial truce. In 2015 Barack Obama, then America's president, and Xi Jinping, his Chinese counterpart, announced a 'common understanding". Neither country would conduct cyber-espionage to steal intellectual property. The agreement worked. Shortly afterwards commercial espionage of this sort fell dramatically, if temporarily. But that was simply the start of the new era of political espionage and sabotage.
All of these areas have been affected by three big shifts within China's hacking programmes. One is who is doing the hacking. In 2015-16, shortly after being shocked by the Snowden revelations, China reshuffled its cyber forces. The pla was forced to retrench, focusing on military intelligence and reconnaissance—like Volt Typhoon—and its activity declined. The mss took over political-intelligence gathering—like Salt Typhoon—which it conducted with gusto, and commercial espionage, which continued on a smaller scale. 'Nowadays," writes Tom Uren, author of 'Risky Business", a cyber newsletter, 'the mss is the big kahuna."
Quieten down, lads
Second, Chinese hacking got better. About 20 years ago, when cyber-security firms began tracking the threat, Chinese hackers were 'very, very loud", says John Hultquist of Mandiant, 'incredibly willing to set off alarms, incredibly willing to be caught". A European official concurs. Even five years ago, she says, 'Chinese cyber operators were not considered very sophisticated." That has now changed. 'The speed at which they improve always seems to come as a surprise to Westerners, even though it really shouldn't," says the official. 'If China wants to accelerate in an area, then they will, and they have very smart people."
That points to a third shift. Chinese cyber operations now draw increasingly on a large and flourishing private-sector ecosystem which has become a talent pipeline, enabler and force multiplier for Chinese cyber operations around the world. Consider the mss-linked Tianfu Cup in the south-western city of Chengdu (which has emerged as a hub for this kind of activity). It is one of many 'capture the flag" (ctf) competitions in which tech-savvy youngsters compete to show off their hacking prowess by finding and exploiting vulnerabilities in software. China has hosted about 130 of these sorts of events since 2004, most of them after 2014, and many backed by government ministries, according to data collected by Dakota Cary, a consultant at SentinelOne, a cyber-security company, and Eugenio Benincasa of the Centre for Security Studies at eth Zurich.
These events can draw huge crowds. The Wangding Cup is organised by the Ministry of Public Security (mps), which runs the country's police force and gathers domestic intelligence. The cup is known as the 'cyber-security Olympics" and can attract 30,000 people, note Mr Cary and Mr Benincasa. The tournaments are scouting grounds for Chinese spooks. As with elite sports, a handful of star hackers tend to drive a team's success. A decade ago Chinese hackers were allowed to travel to contests abroad; that is now restricted. The vulnerabilities they discover—weaknesses in code that can be used to gain access—'are siphoned straight into the state apparatus", says a person familiar with the process. In 2021 the government punished Alibaba Cloud, a tech firm, for divulging a vulnerability without first telling the state.
Talent contests are just the start. Last year, documents belonging to i-Soon were leaked on the internet. They showed that the firm was functioning as a private signals-intelligence agency whose targets spanned 23 countries: Nepal's presidential palace, road-mapping data from Taiwan, South Korean telephone logs, Indian immigration systems and Thailand's intelligence service. i-Soon is one of many such firms in Chengdu.
The firms are not unstoppable ninjas—the leaked files show evidence of internal arguments, disorganisation and failure—but they add to China's cyber heft. Even where mss hackers do the hacking themselves, they often rely on this corporate hinterland for the tools and infrastructure to enable their attacks. When Chinese hackers first started, they used to come, undisguised, 'right out of Shanghai networks", says Mr Hultquist. Today they make use of operational-relay-box (orb) networks, built and maintained by private firms, which use compromised devices around the world, such as home internet routers, to disguise the origin of attacks.
The increasing scale, sophistication and aggression of Chinese hacking are 'by far the most significant shift in the cyber-threat landscape in well over a decade", notes Mr Martin. Volt and Salt Typhoon, on their own, 'are strategic compromises of the West on a scale hitherto unseen by any other cyber power", he warns.
It is not yet an all-out cyberwar. 'What separates China from their peers like Russia, North Korea and Iran", says Mr Hultquist, is that those states routinely cross the line from espionage to disruption, from spying and reconnaissance to outright sabotage. China has 'never pulled the trigger", he says. Even in American infrastructure networks, China has stopped short of inserting destructive code. 'We can see them doing the reconnaissance. We can see them getting into place. They're not showing us the weapon."

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
&w=3840&q=100)

Business Standard
42 minutes ago
- Business Standard
China accuses US of violating trade truce over chip curbs, vows retaliation
China has accused the United States of breaching the terms of a recent trade agreement, escalating tensions between the world's two largest economies just weeks after a temporary truce brought hope for renewed dialogue. The Chinese Ministry of Commerce on Monday issued a statement rejecting US President Donald Trump's claims that Beijing had violated the trade consensus reached in Geneva last month. The ministry denounced a series of fresh US trade measures as "discriminatory", warning that China would take "resolute and forceful measures" to protect its interests if the US continued on its current path. Beijing cited Washington's unilateral actions, including new export restrictions on advanced AI chip technologies and chip design software, as well as the revocation of Chinese student visas, as evidence of the US breaching the agreement. The ministry also referenced an earlier understanding between Trump and Chinese President Xi Jinping on January 17, suggesting the latest US moves violated that accord as well. 'If the US insists on its own way and continues to damage China's interests, China will continue to take resolute and forceful measures to safeguard its legitimate rights and interests,' the ministry said. Trump accuses China of trade violations, threatens fresh tariffs On Friday, Trump claimed via a post on his Truth Social platform that China had 'TOTALLY VIOLATED ITS AGREEMENT WITH US", accusing Beijing of backsliding on its trade promises without specifying details. Trump declared the US would double tariffs on both steel and aluminium imports from China, to 50 per cent from 25 per cent, beginning next week. Although China is the world's largest steel exporter, it has sent minimal volumes to the US since Trump imposed 25 per cent tariffs in 2018. However, China is currently the third-largest supplier of aluminium to the US. Trump also alleged that the temporary May deal to ease triple-digit tariffs for 90 days had been made to save China from what he called 'a devastating situation' of factory shutdowns and civil unrest. The brief tariff rollback, hailed by markets at the time, had reduced the effective US tariff rate to the mid-teens, down from around 25 per cent earlier this year. Did China violate US trade agreement? While Trump did not specify how China had allegedly violated the trade agreement made in Geneva, US Trade Representative Jamieson Greer accused China of failing to accelerate exports of critical minerals essential for advanced electronics. Greer told CNBC that China was 'slow-rolling their compliance', calling Beijing's approach 'completely unacceptable'. He added that the US would need to address the issue, though he did not elaborate on what actions may be taken. The Geneva agreement in mid-May included a 90-day pause on sweeping tariffs. Are US-China trade talks in limbo again? Earlier last week, Treasury Secretary Scott Bessent acknowledged that talks with China were 'a bit stalled' and indicated that direct intervention from both Trump and Xi might be necessary to break the deadlock. 'Getting a deal over the finish line will likely need the direct involvement of Trump and Xi,' he said in an interview with Fox News. White House economic adviser Kevin Hassett had also earlier said a phone call between the leaders was likely this week, but no confirmation has come from Beijing. Despite the rising political rhetoric, US stock markets ended last week relatively flat. Trump's renewed complaints came just two days after he was reportedly angered by a journalist's reference to Wall Street's new acronym 'TACO', short for 'Trump Always Chickens Out', used to describe expectations that he will ultimately soften on aggressive trade actions.


NDTV
44 minutes ago
- NDTV
Donald Trump Shares Bizarre Post Claiming Joe Biden Was "Executed" And Replaced By Clones
US President Donald Trump sparked fresh controversy over the weekend by sharing a post on his social media platform that falsely claimed former President Joe Biden died in 2020 and was replaced by clones. The post, originally shared on Truth Social, declared: "There is no Joe Biden - executed in 2020. Biden clones, doubles and robotic engineered soulless, mindless entities are what you see." The post ended with a series of hashtags and claimed "Democrats don't know the difference." Trump reposted the claim without adding any commentary, leading to criticism online for amplifying a conspiracy theory. The post was part of a series of links Trump shared on Saturday night, many of which focused on his efforts to revive American steel manufacturing. However, the inclusion of a post promoting unfounded claims about Biden's identity stood out and drew attention. This comes even as Trump recently issued a statement wishing Biden a speedy recovery following reports of his cancer diagnosis. "Melania and I are saddened to hear about Joe Biden's recent medical diagnosis," Trump wrote. "We extend our warmest and best wishes to Jill and the family, and we wish Joe a fast and successful recovery." Earlier, Trump called his predecessor Joe Biden's cancer diagnosis "very sad" before accusing former White House staff and the Biden family of "not telling the facts." Casting doubts over the timing of the announcement, the Republican leader said he was "surprised" the public wasn't informed sooner about Biden's condition. "I think it's very sad, actually. I'm surprised that it wasn't, you know -- the public wasn't notified a long time ago," Trump said while talking to reporters in the Oval Office.
&w=3840&q=100)

Business Standard
an hour ago
- Business Standard
Valorant game update: Transition to Unreal Engine 5, replay system and more
American video game developer Riot Games is gearing up for a significant overhaul for Valorant, its flagship tactical shooter, with the game slated to transition to Unreal Engine 5 by the end of July. In a video shared on Valorant's official YouTube channel, the developers informed about the engine shift. The game will be marking a departure from Unreal Engine 4, which has powered the title since its beta release in 2020, and the game based on Unreal Engine 5 will roll out in the coming months with Patch 11.02. As per the company, this transition is expected to maintain the game's familiar feel while enhancing technical performance. With this upgrade, players are likely to get smoother framerates. Valorant: What is coming As per the information shared by the company in a YouTube video, visual consistency will remain largely unchanged for now, though the new engine opens the door for future improvements in graphics and animation. To commemorate the milestone, all players logging in during Patch 11.02 will receive a limited-edition in-game gun buddy. Another long-awaited feature, the replay system, is set to debut in September with Patch 11.06. Initially launching for PC users, the system will allow players to revisit and analyse their recent competitive matches. A console version is expected to follow later this year. Riot has hinted at plans to expand the system's capabilities over time, potentially adding support for other game modes. Alongside the replay rollout, Riot will also introduce multi-factor authentication to combat smurfing and improve competitive integrity. Players will also have the ability to report accounts suspected of abusing matchmaking or rank systems.