logo
China unleashes hackers against its friend Russia, seeking war secrets

China unleashes hackers against its friend Russia, seeking war secrets

Time of India4 hours ago

Since the beginning of the war in Ukraine, groups linked to the Chinese government have repeatedly hacked Russian companies and government agencies in an apparent search for military secrets, according to cyber analysts.
The intrusions started accelerating in May 2022, just months after Moscow's full-scale invasion. And they have continued steadily, with Chinese groups worming into Russian systems even as President Vladimir Putin of
Russia
and President Xi Jinping of
China
publicly professed a momentous era of collaboration and friendship.
The hacking campaign shows that, despite this partnership and years of promises not to hack each other, China sees Russia as a vulnerable target. In 2023, one group, known as Sanyo, impersonated the email addresses of a major Russian engineering firm in the hunt for information on nuclear submarines, according to TeamT5, a Taiwan-based cybersecurity research firm that discovered the attack last year and linked it to the Chinese government.
by Taboola
by Taboola
Sponsored Links
Sponsored Links
Promoted Links
Promoted Links
You May Like
¿La recuerdas? Es triste ver cómo vive hoy en día
Boite A Scoop
Undo
China is far wealthier than Russia and has plenty of homegrown scientific and military expertise, but Chinese military experts often lament that Chinese troops lack battlefield experience. Experts say that China sees the war in Ukraine as a chance to collect information about modern warfare tactics, Western weaponry and what works against them.
"China likely seeks to gather intelligence on Russia's activities, including on its military operation in Ukraine, defense developments and other geopolitical manoeuvres," said Che Chang, a researcher with TeamT5.
Live Events
It is unclear how successful these attempts have been, partly because Russian officials have never publicly acknowledged these intrusions. But a classified counterintelligence document from Russia's domestic security agency, known as the FSB, makes clear that intelligence officials are concerned. The document, obtained by The New York Times, says that China is seeking Russian defence expertise and technology and is trying to learn from Russia's military experience in Ukraine. The document refers to China as an "enemy."
Discover the stories of your interest
Blockchain
5 Stories
Cyber-safety
7 Stories
Fintech
9 Stories
E-comm
9 Stories
ML
8 Stories
Edtech
6 Stories
With Putin largely cut off from the West, his country has come to rely on China to buy its oil and sell it technology that is essential to its war effort. Moscow and Beijing have formed a bloc against Washington and its allies, alarming Western leaders. The FSB document presents a more complicated relationship than the "no-limits" partnership that Xi and Putin describe.
Allies have been known to spy on one another, but the extent of China's hacking activities against Russia suggests both a higher level of mutual distrust and a reluctance by the Kremlin to share all that it is learning on the battlefield in Ukraine.
Drone warfare
and software are of particular interest to China, the document says.
"The war in Ukraine fundamentally shifted intelligence priorities for both countries," said Itay Cohen, a senior researcher with cybersecurity firm
Palo Alto Networks
who has followed Chinese hacking groups for years. Experts say, and the document indicates, that China wants to learn from Russia's war experience to bolster its own preparedness for potential future conflicts. Taiwan, in particular, is a major potential flashpoint with the West.
One Chinese government-funded group has targeted Rostec, the powerful Russian state-owned defense conglomerate, seeking information on satellite communications, radar and electronic warfare, according to Palo Alto Networks. Others have used malicious files, intended to exploit vulnerabilities in Microsoft Word, to penetrate Russian aviation industry targets and state bodies.
Messages seeking comment were left with the Kremlin and the Chinese Embassy in Moscow.
Not all Chinese hacking groups operate at the behest of the government. But security experts have seen evidence of government ties.
Russian cybersecurity firm
Positive Technologies
, for example, said in 2023 that cyberattacks had been mounted on several Russian targets, including in the aerospace, private security and defense sectors. The attackers used a tool known as Deed RAT, which is widely deployed by Chinese state-sponsored hackers. Cybersecurity experts say Deed RAT is considered "proprietary" among these groups and is not available for purchase on the dark web like other malware tools.
That has enabled state-backed hacking groups in China to use it more widely because it is tough for their adversaries to find a way to combat the malware.
Chinese state-sponsored hacking groups have often targeted international companies and government institutions, including in the United States and Europe. But hacking groups appear to have become more interested in Russian targets after the country's February 2022 invasion of Ukraine.
Chang said he and his colleagues tracked several Chinese hacking groups targeting Russia. Among them was one of the country's most active hacking groups, known as Mustang Panda.
Little is known about Mustang Panda's origins or where it operates inside China, according to researchers who have studied the group. Its activities often accompanied China's Belt and Road economic development initiative, according to Rafe Pilling, director of threat intelligence at security firm Sophos. As China invested in development projects in West Africa and Southeast Asia, he said, hacking soon followed.
That is most likely because China invests in countries where it has political and economic interests, which motivates state-sponsored hackers, Pilling said.
After Russia invaded Ukraine, TeamT5 said that Mustang Panda expanded its scope to target governmental organizations in Russia and the European Union.
Pilling, who has been monitoring Mustang Panda's activities for several years, says he suspects that the group is backed by China's Ministry of State Security, its main intelligence body. The ministry supports threat groups that attack targets around the world, he said. In 2022, Mustang Panda targeted Russian military officials and border guard units near the Siberian border with China.
"The targeting we've observed tends to be political and military intelligence-gathering," Pilling said. That is true of all Chinese hacking groups targeting Russia, he said. "I think of them as being one of the main tools that the Chinese state has for gathering political and economic intelligence."
Mustang Panda has also attracted the attention of U.S. authorities. In January, the Justice Department and the FBI said that Mustang Panda's malware had infected thousands of computer systems, seeking to steal information. Many of the targets were American, but the malware was also found on computers belonging to Chinese dissidents and European and Asian governments, according to a federal indictment.
The indictment makes clear that the United States believes that Mustang Panda is a state-sponsored group.
Other Chinese groups have targeted Russia, too. Chang said his team was following another threat group, Slime19, that is continuously targeting the Russian government, energy and defence sectors.
In agreements in 2009 and 2015, China and Russia promised not to carry out cyberattacks targeting each other. But even at the time, analysts suggested that the announcement was largely symbolic.
Chinese hacking in Russia did not begin with the war in Ukraine. A 2021 cyberattack, for example, targeted Russian submarine designers. But experts say the war prompted a spike in computer intrusions.
"The activity -- we saw it immediately in the months following Russia's full-scale invasion of Ukraine," Cohen said. "Even though the public narrative was of close ties between Russia and China."

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Promotion of state govt staff sets in motion after cabinet nod
Promotion of state govt staff sets in motion after cabinet nod

Time of India

time37 minutes ago

  • Time of India

Promotion of state govt staff sets in motion after cabinet nod

Bhopal: As the Madhya Pradesh cabinet paved way for the promotion of govt employees after nine years, the departments will soon start the promotion process based on the cabinet decision. Meanwhile, SAPAKS is preparing to challenge the new promotion rules in court. The govt is also aware of the issue and has directed the departments to expedite the promotion of govt employees, as per the rules cleared in the cabinet meeting. The process will commence soon after the departments receive the notification from the general administration department in this regard. Chief minister Mohan Yadav chaired the cabinet meeting held on Tuesday in the secretariat. The cabinet approved the Madhya Pradesh Public Service Promotion Rules, 2025, ensuring the representation and protection of the interests of the reserved categories. Provisions include a 20% reservation for Scheduled Tribes (ST) and 16% for Scheduled Castes (SC). SC and ST public servants will also have the opportunity for promotion based on merit. SAPAKS, an organisation of general category, OBC, and minority govt employees, president KS Tomar said, "We have no option but to challenge the rules in court." by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Eat 1 Teaspoon Every Night, See What Happens A Week Later! [Video] getfittoday Undo After the cabinet meeting, the govt stated that it has been provided that promotion committees may meet in the current year itself to prepare selection lists for the next year's vacancies, i.e., provisions for advance DPCs (Departmental Promotion Committees) have been included. Due weightage is given to seniority, and among senior officials, those obtaining the minimum qualifying marks will be eligible for promotion. For Class I officers, a merit-cum-seniority principle will apply. The rules aim to encourage efficiency, with clear criteria defining ineligibility for promotion. Circumstances under which an official becomes ineligible and the impact of penalties are clearly outlined. Provisions have been made for holding review DPCs for reconsideration of decisions. The new rules eliminate the system of rotation, which will help create more promotional posts. DPCs are empowered to determine the suitability of candidates, the govt stated. The problem for the general category employees is that SC and ST public servants will also have the opportunity for promotion based on merit, in addition to the 20% reservation for Scheduled Tribes (ST) and 16% for Scheduled Castes (SC). The govt is aware of the grounds on which the promotion rules will be challenged in court, and officials mentioned they have also done their homework. The promotion of the state govt employees has been on hold since 2016. Over a lakh of govt employees have retired while waiting to get promotions.

Canada Spy Agency Flags Khalistani Extremism and Indian Foreign Interference in Public Report
Canada Spy Agency Flags Khalistani Extremism and Indian Foreign Interference in Public Report

The Wire

time37 minutes ago

  • The Wire

Canada Spy Agency Flags Khalistani Extremism and Indian Foreign Interference in Public Report

The Canadian Security Intelligence Service (CSIS) has highlighted both the threat of Khalistani extremism emanating from Canadian soil and concerns over Indian foreign interference in its latest annual public report. spy agency's annual report was submitted to Canada's parliament last week, it was made public on Wednesday (June 18). Earlier this week, Indian Prime Minister Narendra Modi was in Canada to take part in the outreach session of the G7 summit. Modi met new Canadian Prime Minister Mark Carney in a symbolic thaw after a nearly-20 month-long diplomatic freeze triggered by then-Prime Minister Justin Trudeau's 2023 allegation that Indian government agents were involved in the killing of a Canadian citizen. India had strongly denied the charge, calling it 'absurd' and politically motivated. In the chapter on violent extremism, the report defines politically motivated violent extremism (PMVE) as the encouragement of the 'use of violence to establish new political systems or new structures or norms within existing systems'. It singles out 'Canada-based Khalistani extremists' (CBKEs) as the primary source of such threats in recent decades, accusing them of supporting or planning violent activities aimed at establishing an independent state of Khalistan in India's Punjab region. 'Since the mid-1980s, the PMVE threat in Canada has manifested primarily through Canada-based Khalistani extremists seeking to use and support violent means,' the report says. While it makes a distinction between non-violent Khalistan advocacy – which it says is not considered extremism – and violent activity, the CSIS report says that 'small group of individuals are considered Khalistani extremists because they continue to use Canada as a base for the promotion, fundraising or planning of violence primarily in India'. Although no CBKE-linked attacks occurred in Canada in 2024, the CSIS notes that 'ongoing involvement in violent activities by CBKEs continues to pose a national security threat to Canada and Canadian interest'. The agency cautions that 'real and perceived Khalistani extremism' contributes to heightened tensions with India and continues to drive Indian foreign interference activities in Canada. the 2023 CSIS annual report made no mention of Khalistan or Khalistani extremism, and references to India were limited to the June 2023 killing of Hardeep Singh Nijjar and the arrest of Indian national Nikhil Gupta in the US, who was charged in a separate alleged plot targeting a dual American-Canadian citizen in New York. By contrast, the scope of the 2024 report is significantly expanded. It accuses the Indian government of conducting foreign interference through 'clandestine, deceptive or threatening' tactics. According to the CSIS, these efforts are aimed at aligning Canadian policies with New Delhi's interests, particularly in relation to Khalistan-related advocacy. The Canadian spy agency lists India alongside China, Russia, Iran and Pakistan as one of the 'main perpetrators of foreign interference and espionage against Canada'. It claims that India's interference efforts involve leveraging 'ethnic, religious and cultural communities' and influencing Canadian political discourse. The report says that following Modi's election as prime minister, India's government has increasingly sought to project global influence and suppress what it sees as 'anti-India' activity abroad. At the same time, the CSIS notes that India has 'a long history' of viewing Canada as a haven for anti-India elements – particularly in the context of the 1985 Air India bombing and subsequent Khalistan-related incidents. The report also references the murder investigation of separatist Nijjar, whose killing outside a British Columbia gurdwara in June 2023 led to a diplomatic standoff. Four suspects were arrested in May 2024. In connection with the investigation, the Royal Canadian Mounted Police announced in October that it had uncovered evidence of links between Indian government agents and criminal networks involved in violence against Sikh communities in Canada. of high commissioners and five other diplomats by each country. The CSIS also says that as Public Inquiry on Foreign Interference (PIFI) hearings began in March 2024, the extent of Indian foreign interference became 'clearer'. It warns that 'transnational repression', which it defines as foreign governments targeting diaspora communities to suppress dissent, has become a growing feature of India's intelligence activities in Canada, which it states against the backdrop of the PIFI hearings. The CSIS concludes by stating that it would continue to monitor and assess the scope of India's alleged foreign interference. It asserted that such interference extends beyond diaspora communities to potentially influencing Canada's political institutions and decision-making processes. The agency underlines that Indian activities – both real and alleged – will remain under close scrutiny in the years ahead. It says 'Canada must remain vigilant about continued foreign interference conducted by the Government of India, not only within ethnic, religious and cultural communities but also in Canada's political system.'

Rare earths set to get up to Rs 5,000 crore incentive scheme
Rare earths set to get up to Rs 5,000 crore incentive scheme

Time of India

time39 minutes ago

  • Time of India

Rare earths set to get up to Rs 5,000 crore incentive scheme

India has firmed up a ₹3,500-5,000 crore scheme to incentivise production of rare earth minerals and derived magnets in the country and could be approved in a fortnight, a top government official said. "The priority is to start domestic-critical mineral production in the shortest time period," the official told ET. The sops under the proposed scheme will be offered through a reverse auction process, the official said. The decision to offer incentives for rare earths comes after an internal ministerial review flagged the need for diversification in the wake of acute dependence on Chinese imports. "Fresh steps are being taken to boost domestic availability of critical minerals," he said, adding that at least five large domestic companies had informally expressed keenness to produce these in consultations with the government. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like New Container Houses Vietnam (Prices May Surprise You) Container House | Search ads Search Now Undo China has a near monopoly of the world's supply of rare earth magnets and has curbs on exports. These critical minerals needed in the manufacture of rare earth magnets are crucial for making cars, electric vehicles (EVs) and the renewable energy infrastructure. Industry, particularly the automobile industry, has flagged the detrimental impact of the Chinese curbs and sought government intervention. Beijing in April made a special export licences mandatory for export of seven rare earth elements and related magnets. India's EV and wind turbine makers are the largest demand centres for rare earth elements, cornering over half the entire 4010 metric tonne domestic demand in 2025. Overall demand is expected to more than double to 8220 metric tonnes by 2030. Live Events Besides, the government is also planning an amendment to the Mines and Minerals (Development and Regulation) Act to support the critical mineral mission. Besides regulatory tweaks, the Centre is also expecting commercially viable domestic production of rare earth permanent magnets in small quantities later this year. The ministry of science and technology had sanctioned funding for Midwest Advanced Materials Private Ltd, Hyderabad.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store