
How China's Patriotic ‘Honkers' Became the Nation's Elite Cyber Spies
In the summer of 2005, Tan Dailin was a 20-year-old grad student at Sichuan University of Science and Engineering when he came to the attention of the People's Liberation Army of China.
Tan was part of a burgeoning hacker community known as the Honkers—teens and twenty-somethings in late-90s and early-00s China who formed groups like the Green Army and Evil Octal, and launched patriotic cyberattacks against western targets they deemed disrespectful to China. The attacks were low-sophistication—mostly web site defacements and denial-of-service operations targeting entities in the US, Taiwan, and Japan—but the Honkers advanced their skills over time, and Tan documented his escapades in blog posts. After publishing about hacking targets in Japan, the PLA came calling.
Tan and his university friends were encouraged to participate in a PLA-affiliated hacking contest and won first place. The PLA invited them to an intense, month-long hacker training camp, and within weeks Tan and his friends were building hacking tools, studying network infiltration techniques, and conducting simulated attacks.
The subsequent timeline of events is unclear, but Tan, who went by the hacker handles Wicked Rose and Withered Rose, then launched his own hacking group—the Network Crack Program Hacker (NCPH). The group quickly gained notoriety for winning hacking contests and developing hacking tools. They created the GinWui rootkit, one of China's first homegrown remote-access backdoors and then, experts believe, used it and dozens of zero-day exploits they wrote in a series of 'unprecedented' hacks against US companies and government entities over the spring and summer of 2006. They did this on behalf of the PLA, according to Adam Kozy, who tracked Tan and other Chinese hackers for years as a former FBI analyst who now heads the SinaCyber consulting firm, focused on China.
Tan revealed online at the time that he and his team were being paid about $250 a month for their hacking, though he didn't say who paid or what they hacked. The pay increased to $1,000 a month after their summer hacking spree, according to a 2007 report by former threat intelligence firm VeriSign iDefense.
At some point, Tan switched teams and began contracting for the Ministry of State Security (MSS), China's civilian intelligence agency, as part of its notorious hacking group known as APT 41. And in 2020, when Tan was 36, the US Justice Department announced indictments against him and other alleged APT 41 members for hacking more than 100 targets, including US government systems, healthcare organizations, and telecoms.
Tan's path to APT 41 isn't unique. He's just one of many former Honkers who began their careers as self-directed patriotic hackers before being absorbed by the state into its massive spying apparatus.
Not a lot has been written about the Honkers and their critical role in China's APT operations, outside of congressional testimony Kozy gave in 2022. But a new report, published this month by Eugenio Benincasa, senior cyber defense researcher at the Center for Security Studies at ETH Zürich university in Switzerland, expands on Kozy's work to track the Honkers' early days and how this group of skilled youths became some of China's most prolific cyber spies.
'This is not just about [Honkers] creating a hacker culture that was implicitly aligned with national security goals,' Benincasa says, 'but also the personal relations they created [that] we still see reflected in the APTs today.' Early Days
The Honker community largely began when China joined the internet in 1994, and a network connecting universities and research centers across the country for knowledge-sharing put Chinese students online before the rest of the country. Like US hackers, the Honkers were self-taught tech enthusiasts who flocked to electronic bulletin boards (dial-up forums) to share programming and computer hacking tips. They soon formed groups like Xfocus, China Eagle Union, and The Honker Union of China, and came to be known as Red Hackers or Honkers, a name derived from the Mandarin word 'hong,' for red, and 'heike,' for dark visitor—the Chinese term for hacker.
The groups were self-governing with loosely formed hierarchies and even had codes of ethics shaped by influential members like Taiwanese hacker Lin Zhenglong (known by his handle 'coolfire'). Lin believed hacking skills should be cultivated only to strengthen cyber defenses— to learn the ways of hackers in order to thwart them—and wrote an influential hacking manual 'to raise awareness about the importance of computer security, not to teach people how to crack passwords.'
There were no simulated environments for hackers to build their skills at the time, so Honkers often resorted to hacking real networks. Lin didn't oppose this—hacking wasn't illegal in China except against government, defense, or scientific research networks—but he published a set of ethical guidelines advising hackers to avoid government systems or causing permanent damage and to restore systems to their original condition after Honkers finished hacking them.
But these guidelines soon fell away, following a series of incidents involving foreign affronts to China. In 1998, a wave of violence in Indonesia broke out against ethnic Chinese there, and outraged Honker groups responded with coordinated website defacements and denial of service attacks against Indonesian government targets. The next year, after Taiwanese president Lee Teng-hui announced his 'Two-States Theory' challenging the Communist Party's "One China" doctrine, the Honkers defaced Taiwanese government sites with patriotic messages asserting the existence of a unified China.
In 2000, after participants at a conference in Japan denied facts around the Nanjing Massacre, in which an estimated 300,000 Chinese were killed during Japan's 1930's occupation of the city, Honkers circulated a list of more than 300 Japanese government and corporate sites, along with email addresses of Japanese officials, and prompted members to target them.
The so-called patriotic cyberwars gave the Honkers a common cause that forged an identity unique from western hacking groups, which the Honkers had emulated until then. Where western hackers were primarily motivated by curiosity, intellectual challenge, and bragging rights, the Honkers bonded over their common cause to help China 'rise up.' In the words of a China Eagle Union pledge, the Honkers vowed 'to put the interests of the Chinese nation above everything else.'
The patriotic wars put China's Honkers on the map and inspired more to join them. Honker Union swelled to an estimated 80,000 members, Green Army to 3,000. Most were just enthusiasts and adventure seekers, but a subset stood out for leadership and hacking skills. A particularly influential group among these, whom Benincasa calls the Red 40, would go on to found or join many of China's top cybersecurity and tech firms and become integral to the state's cyberspy machine.
There's no evidence that the government directed the patriotic hacking operations, says Benincasa, but their activity aligned with state interests, and they drew government attention. A retired PLA rear admiral and former professor at the PLA National Defense University praised their patriotism. The public also appeared to support it. A report claimed that 84 percent of internet users in China favored the patriotic hacking.
But in April 2001, this began to change after a Chinese fighter jet clipped a US reconnaissance plane mid-air off the coast of Hainan and sparked an international incident. The collision killed the Chinese pilot and forced the US plane to land on Hainan, where the Chinese military seized the aircraft and held the crew for more than a week. The incident stoked nationalist sentiments among US and Chinese hackers alike, and both sides lobbed cyberattacks against the other country's systems.
The Chinese government grew concerned over its lack of control of the Honkers and feared they could become a liability and escalate tensions. The Chinese Communist Party's official newspaper likened the hacking to "web terrorism,' and the head of the Internet Society of China issued a statement through China's official state media condemning it as well. The retired PLA rear admiral who previously praised the groups now warned they were a threat to international relations.
The Honkers got the message, but with their patriotic mission shelved, the groups now became less cohesive. There were leadership clashes and disagreements over direction and priorities—some wanted to turn professional and launch cybersecurity companies to defend China's systems against attack, others wanted to go rogue and sell malicious tools. The former left to join tech firms like Baidu, Alibaba, and Huawei or cybersecurity firms like Venustech and Topsec. Some became entrepreneurs and launched their own security firms, like NSFocus and Knownsec, which became leaders in vulnerability research and threat intelligence. Some, however, shifted to cybercrime. And others, like Tan, became contract hackers for the PLA and MSS, or founded firms that served these operations. Honker Recruitment
According to Benincasa, the PLA and MSS began hiring Honkers around 2003, but the recruitment became more structured and earnest following the 2006 hackings attributed to NCPH and Tan. The recruitment expanded during and after the 2008 Beijing Olympics, and was likely helped in 2009 with the passage of China's Criminal Law Amendment VII, which criminalized unauthorized intrusions into any network as well as the distribution of hacking tools.
Hacker forums began to shutter, and some Honkers got arrested. Word spread that Tan was among them. According to Kozy, Tan faced seven and a half years in prison, though it's unclear if he served any time. Kozy believes he cut a deal and began work for the MSS. In 2011, it appears he launched an antivirus firm named Anvisoft, which may have served as a front for his MSS work.
Former Honkers Zeng Xiaoyong (envymask) and Zhou Shuai (coldface) also became contractors for the PLA and MSS and worked on operations conducted by APT 41, APT 17, and APT 27, according to Benicassa. Some worked through shell companies, others worked through legitimate firms who acted as intermediaries to the intelligence services.
Topsec and Venustech were two firms alleged to have assisted these efforts. Topsec employed a number of former Honkers, including the founder of the Honker Union of China, and Topsec's founder once acknowledged in an interview that the PLA directed his company. In 2015, Topsec was linked to state-sponsored cyber operations, including the Anthem Insurance breach in the US.
Over the years, many tools used by China APT groups were built by Honkers, and the PLA and MSS mined them for vulnerability research and exploit development. In 1999, Huang Xin (glacier), a member of Green Army, released 'Glacier,' a remote-access trojan. The next year, he and Yang Yong (coolc) from XFocus released X-Scan, a tool to scan networks for vulnerabilities that is still used by hackers in China today. In 2003, two members of Honker Union released HTRAN, a tool to hide an attacker's location by rerouting their traffic through proxy computers, which has been used by China's APTs. Tan and fellow NCPH member Zhou Jibing (whg) are believed to have created the PlugX backdoor in 2008, which has been used by more than 10 Chinese APTs. According to Benincasa, Zhou developed it even further to produce ShadowPad, which has been used by APT 41 and others.
Over the years, leaks and US indictments against former Honkers have exposed their alleged post-Honker spy careers, as well as China's use of for-profit firms for state hacking operations. The latter include i-Soon and Integrity Tech, both launched by former Honkers.
Wu Haibo (shutdown), formerly of Green Army and 0x557, launched i-Soon in 2010. And last year, someone leaked internal i-Soon files and chat logs, exposing the company's espionage work on behalf of the MSS and MPS. In March this year, eight i-Soon employees and two MPS officers were indicted by the US for hacking operations that targeted US government agencies, Asian foreign ministries, dissidents, and media outlets.
Integrity Tech, founded in 2010 by former Green Army member Cai Jingjing (cbird), was sanctioned by the US this year over ties to global infrastructure hacks.
This year, the US also indicted former Green Army members Zhou and Wu for conducting state hacking operations and sanctioned Zhou over links to APT 27. In addition to engaging in state-sponsored hacking, he allegedly also ran a data-leak service selling some of the stolen data to customers, including intelligence agencies.
This isn't unlike early-generation US hackers who also transitioned to become cybersecurity company founders, and also got recruited by the National Security Agency and Central Intelligence Agency or hired by contractors to perform hacking operations for US operations. But unlike the US, China's whole-of-society intelligence authorities have compelled some Chinese citizens and companies to collaborate with the state in conducting espionage, Kozy notes.
'I think that China from the beginning just thought, 'We can co-opt [the Honkers] for state interests.'' Kozy says. 'And … because a lot of these young guys had patriotic leanings to begin with, they were kind of pressed into service by saying, 'Hey you're going to be doing a lot of really good things for the country.' Also, many of them started to realize they could get rich doing it.'

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
10 minutes ago
- Yahoo
Opinion: Focus on tariffs is ignoring Canada's fastest-growing trade opportunity
With the latest 35 per cent tariff threat from United States President Donald Trump, the national trade discussion and news headlines are, understandably, fixated once again on tariffs on goods and what to do about them. As a relatively small, open economy, Canada relies heavily on trade — especially trade with our neighbour and the world's largest market — to sustain living standards. But focusing only on physical goods risks missing a major opportunity. Canada's fastest-growing export category is not oil or autos. It is digitally delivered services. These services are delivered remotely or sold via digital platforms. Digital services do not move across physical borders. They move through code, platforms and cross-border data flows. Over the past 20 years, they have grown nearly four times faster than Canada's other exports, yet they remain largely absent from the national trade conversation. A new discussion paper from the Asia Pacific Foundation of Canada points out that digital service exports now account for almost two-thirds of Canada's commercial services exports. Growth is strongest in sectors such as software, engineering, audiovisual services and IT consulting. Digital services are also the fastest-growing part of global trade. Since 2005, they have grown more than three times faster than goods trade globally. Their share of total world services exports has climbed to more than 50 per cent from 30 per cent. The fastest-growing importers of digital services include Indonesia, Vietnam, Chile, Peru, the Philippines and India, where demand for digital solutions is growing rapidly across sectors such as information technology, fintech and e-commerce. Many fast-growth markets now import more digital services than traditional goods. Cloud-based collaboration, seamless and instant language translation, and digital platforms are accelerating this shift. New artificial intelligence (AI) developments further expand the menu of what can be traded globally. Canada has the foundations in place to seize this opportunity. This country has world-class AI researchers, firms that are digitally enabled and diaspora connections to emerging digital markets. Canadians are also among the top global users of generative AI tools. The federal government now has a dedicated minister for AI and digital innovation. Canadian trade policymakers have been leaders in including digital provisions in trade agreements. The Canada-U.S.-Mexico Agreement (CUSMA) and the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP) already contain modern digital trade rules, and Canada has just announced a new digital trade agreement to be negotiated alongside the Canada-European Union Comprehensive Economic and Trade Agreement (CETA). But despite all these tools, Canada is punching far below its weight. Our digital services exports have rapidly grown, but our global market share remains below three per cent. That is well behind the United Kingdom, France and the Netherlands. Ottawa needs to reframe Canada's trade discussion for the digital and AI era. Digital trade is growing quickly, faces different restrictions than physical trade and relies less on geography, and is aligned with Canada's relative strengths. Canada should adopt a clear national goal: double its share of global digital services exports by 2030 and ensure that at least half go to markets beyond North America. This target would focus national attention and provide a benchmark for progress in a fast-growing part of the global economy. It would also help identify and address the barriers that digital exporters face. Canada already offers support through trade commissioners and export financing, but these efforts are rarely co-ordinated around a shared objective. Moreover, those responsible for AI and digital innovation do not co-ordinate with those responsible for trade. A clear target would connect these discussions. Canadian firms in traditional sectors such as manufacturing, agri-food and mining could also benefit from embedding more digital services into their exports. But the data on digital services inputs shows that most are not adopting these inputs in significant ways. Strengthening digital services trade would support these sectors by making their offerings more competitive and more resilient amid the trade crisis. Policymakers should treat digital trade as core to the country's economic strategy. Canada has the tools it needs to capitalize on the new trade possibilities that have already emerged. Jack Mintz: Governments may overproduce, but not the private sector Opinion: Our long-running trade soap opera with the Americans An increased focus on digital trade also helps derisk Canada's overall trade portfolio. It expands both the types of trade and markets for that trade, making Canada's economy more resilient in the face of tariff whiplash under Trump 2.0. Kati Suominen is the founder and chief executive of Nextrade Group, and Danielle Goldfarb is a distinguished fellow at the Asia Pacific Foundation of Canada. Sign in to access your portfolio
Yahoo
40 minutes ago
- Yahoo
Hackers use Microsoft security flaw to commit global assault
July 21 (UPI) -- An investigation is underway after hackers used a security flaw in Microsoft software to internationally infiltrate agencies and businesses over the weekend. The United States, Canada and Australia have partnered in an effort to probe how the unidentified hackers used a security weak spot in Microsoft's SharePoint collaboration software to gain access to several American federal and state agencies, as well as energy companies, universities and an Asian telecommunications company. Microsoft announced Saturday that it "is aware of active attacks targeting on-premises SharePoint Server customers by exploiting vulnerabilities partially addressed by the July Security Update." Researchers at the Eye Security cybersecurity company first identified the weak point on Friday, explained as a "new SharePoint remote code execution vulnerability chain in the wild," it allows hackers to access the exploited SharePoint versions and steal keys that can let them impersonate users even after an affected server is patched or rebooted. As a result, hackers can use the liability to steal passwords and sensitive data and then travel the breached network through services that connect to SharePoint, such as Outlook, Teams and OneDrive. The SharePoint servers allow for documents to be shared and managed, and Microsoft has since released patches to defend SharePoint 2019 and SharePoint Subscription Edition servers, but a patch for SharePoint 2016 is still forthcoming. The attack, referred to a "zero-day" incident because it used a previously unknown vulnerability, only impacts servers housed within on-premises organizations, but not cloud operations like Microsoft 365. According to the press release from Microsoft, customers using the SharePoint Subscription Edition should "apply the security update provided in CVE-2025-53771 immediately to mitigate the vulnerability." As for those who use SharePoint 2016 or 2019, the current guidance is to "use or upgrade to supported versions of on-premises Microsoft SharePoint Server," which are SharePoint Server 2016, 2019 and SharePoint Subscription Edition, and then apply the latest security updates.
Yahoo
an hour ago
- Yahoo
UN concerned by Taliban's arrest of Afghan women for dress code violations
The United Nations has expressed concern about the Taliban's arrest of Afghan women and girls for their alleged failure to comply with dress code restrictions. In May 2022, the Taliban government issued a decree calling for women to show only their eyes and recommending they wear a head-to-toe burqa. The Taliban, which returned to power in 2021, has cracked down on the way women dress and behave in public, notably through morality laws forbidding them to show their faces outside the home. The UN mission in Afghanistan said it was concerned by the arrest of 'numerous' women and girls in Kabul between July 16 and 19, who authorities claimed had not followed instructions on wearing the hijab, or the Islamic headscarf. 'These incidents serve to further isolate women and girls, contribute to a climate of fear, and erode public trust,' the mission added, without details including the number of arrests or the ages and where they have been held. The UN mission urged the Taliban government to 'rescind policies and practices' that restrict women and girls' human rights and fundamental freedoms, particularly the ban on education beyond sixth grade. A Taliban representative was not immediately available for comment. In January 2024, the country's Vice and Virtue Ministry said it had arrested women in the Afghan capital for wearing 'bad hijab'. A ministry spokesman, Abdul Ghafar Farooq, did not say how many women were arrested or what constituted bad hijab. The UN mission said at the time it was looking into claims of ill treatment of the women and extortion in exchange for their release. The Taliban took control of Afghanistan in August 2021 following the withdrawal of US and Nato forces. Since then, the Taliban administration has sought international recognition while enforcing its interpretation of Islamic law. In July, Russia became the only country to grant formal recognition.