www.justice.gov Open in urlscan Pro
2a02:26f0:1700:188::1dae  Public Scan

Submitted URL: https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDAsInVyaSI6ImJwMjpjbGljayIsInVybCI6Imh0dHBzO...
Effective URL: https://www.justice.gov/opa/pr/seven-hackers-associated-chinese-government-charged-computer-intrusions-targeting-perceived
Submission: On November 05 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://search.justice.gov/search

<form class="usa-search usa-search--small" role="search" accept-charset="UTF-8" action="https://search.justice.gov/search" id="search_form" method="get" data-once="form-updated" data-drupal-form-fields="affiliate,search-field-en-small-desktop">
  <label class="usa-sr-only" for="search-field-en-small-desktop">Search</label>
  <div>
    <input name="utf8" type="hidden" value="✓">
  </div>
  <input id="affiliate" name="affiliate" type="hidden" value="justice">
  <input class="usa-input" autocomplete="off" id="search-field-en-small-desktop" name="query" type="search" placeholder="Search">
  <button class="usa-button" type="submit">
    <img src="/themes/custom/usdoj_uswds/images/doj-icon-header-search.svg" class="usa-search__submit-icon width-3" alt="Search">
  </button>
</form>

GET https://search.justice.gov/search

<form class="usa-search usa-search--mobile" role="search" accept-charset="UTF-8" action="https://search.justice.gov/search" method="get" data-once="form-updated" data-drupal-form-fields="affiliate-mobile,search-field-en-small">
  <div class="width-full padding-2">
    <label class="usa-sr-only" for="search-field-en-small"> Search </label>
    <input id="affiliate-mobile" name="affiliate" type="hidden" value="justice">
    <input class="usa-input" id="search-field-en-small" type="search" name="query" placeholder="Search">
    <button class="usa-button" type="submit">
      <img src="/themes/custom/usdoj_uswds/images/doj-icon-header-search.svg" alt="Search">
    </button>
  </div>
</form>

Text Content

Skip to main content


An official website of the United States government

Here's how you know

Here's how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock ( Lock Locked padlock ) or https:// means you’ve safely connected to the
.gov website. Share sensitive information only on official, secure websites.

DOJ Menu
U.S. Department of Justice
 * About
   * The Attorney General
   * Organizational Chart
   * Budget & Performance
   * History
   * Privacy Program
 * Our Work
 * News
   * Press Releases
   * Speeches
   * Videos
   * Photo Galleries
   * Blogs
   * Podcasts
 * Resources
   * Guidance Documents
   * Forms
   * Publications
   * Information for Victims in Large Cases
   * Justice Manual
   * Business and Contracts
 * Grants
 * Employment
   * Why Justice ?
   * Benefits
   * DOJ Vacancies
   * Legal Careers at DOJ

 * Our Offices
 * Find Help
 * Contact Us


UTILITIES

 * Our Offices
 * Find Help
 * Contact Us

Search

Menu Close
 * About
 * News
 * Documents
 * Internships
 * FOIA
 * Contact
 * Information for Journalists

 * Our Offices
 * Find Help
 * Contact Us

Main Menu
U.S. Department of Justice

 * Justice.gov Home
 * About
   * title="About" About
   * The Attorney General
   * Organizational Chart
   * Budget & Performance
   * History
   * Privacy Program
 * Our Work
 * News
   * title="News" News
   * Press Releases
   * Speeches
   * Videos
   * Photo Galleries
   * Blogs
   * Podcasts
 * Resources
   * title="Guidance & Resources" Resources
   * Guidance Documents
   * Forms
   * Publications
   * Information for Victims in Large Cases
   * Justice Manual
   * Business and Contracts
 * Grants
 * Employment
   * Employment
   * Why Justice ?
   * Benefits
   * DOJ Vacancies
   * Legal Careers at DOJ

 * Our Offices
 * Find Help
 * Contact Us

Search


BREADCRUMB

 1. Justice.gov
 2. Office of Public Affairs
 3. News
 4. Press Releases
 5. Seven Hackers Associated With Chinese Government Charged With Computer
    Intrusions Targeting Perceived Critics of China and U.S. Businesses and
    Politicians




MENU NEWS

 * All News
 * Blogs
 * Photo Galleries
 * Podcasts
 * Press Releases
 * Speeches
 * Videos


ARCHIVED PRESS RELEASES

Archived News

--------------------------------------------------------------------------------

Para Notícias en Español

Press Release


SEVEN HACKERS ASSOCIATED WITH CHINESE GOVERNMENT CHARGED WITH COMPUTER
INTRUSIONS TARGETING PERCEIVED CRITICS OF CHINA AND U.S. BUSINESSES AND
POLITICIANS

Monday, March 25, 2024
Share
 * FacebookLinks to other government and non-government sites will typically
   appear with the “external link” icon to indicate that you are leaving the
   Department of Justice website when you click the link.
 * XLinks to other government and non-government sites will typically appear
   with the “external link” icon to indicate that you are leaving the Department
   of Justice website when you click the link.
 * LinkedInLinks to other government and non-government sites will typically
   appear with the “external link” icon to indicate that you are leaving the
   Department of Justice website when you click the link.
 * Email

For Immediate Release
Office of Public Affairs
Defendants Operated as Part of the APT31 Hacking Group in Support of China’s
Ministry of State Security’s Transnational Repression, Economic Espionage and
Foreign Intelligence Objectives

Note: Concurrent with this announcement, the U.S. Department of the Treasury
imposed sanctionsLinks to other government and non-government sites will
typically appear with the “external link” icon to indicate that you are leaving
the Department of Justice website when you click the link. against two of the
defendants, and the U.S. Department of State announced a Reward for Justice up
to $10 millionLinks to other government and non-government sites will typically
appear with the “external link” icon to indicate that you are leaving the
Department of Justice website when you click the link. for information on these
individuals, their organization, and associated entities.

See also the UK Government attribution statementLinks to other government and
non-government sites will typically appear with the “external link” icon to
indicate that you are leaving the Department of Justice website when you click
the link.; the National Cyber Security Centre statementLinks to other government
and non-government sites will typically appear with the “external link” icon to
indicate that you are leaving the Department of Justice website when you click
the link.; and the U.S. State Department's diplomatic statement Links to other
government and non-government sites will typically appear with the “external
link” icon to indicate that you are leaving the Department of Justice website
when you click the link.from the Office of the Spokesperson.

View the indictment here.

An indictment was unsealed today charging seven nationals of the People’s
Republic of China (PRC) with conspiracy to commit computer intrusions and
conspiracy to commit wire fraud for their involvement in a PRC-based hacking
group that spent approximately 14 years targeting U.S. and foreign critics,
businesses, and political officials in furtherance of the PRC’s economic
espionage and foreign intelligence objectives.

The defendants are Ni Gaobin (倪高彬), 38; Weng Ming (翁明), 37; Cheng Feng (程锋), 34;
Peng Yaowen (彭耀文), 38; Sun Xiaohui (孙小辉), 38; Xiong Wang (熊旺), 35; and Zhao
Guangzong (赵光宗), 38. All are believed to reside in the PRC.

“The Justice Department will not tolerate efforts by the Chinese government to
intimidate Americans who serve the public, silence the dissidents who are
protected by American laws, or steal from American businesses,” said Attorney
General Merrick B. Garland. “This case serves as a reminder of the ends to which
the Chinese government is willing to go to target and intimidate its critics,
including launching malicious cyber operations aimed at threatening the national
security of the United States and our allies.”

“Over 10,000 malicious emails, impacting thousands of victims, across multiple
continents. As alleged in today’s indictment, this prolific global hacking
operation – backed by the PRC government – targeted journalists, political
officials, and companies to repress critics of the Chinese regime, compromise
government institutions, and steal trade secrets,” said Deputy Attorney General
Lisa Monaco. “The Department of Justice will relentlessly pursue, expose, and
hold accountable cyber criminals who would undermine democracies and threaten
our national security.” 

"Today's announcement exposes China's continuous and brash efforts to undermine
our nation's cybersecurity and target Americans and our innovation,” said FBI
Director Christopher Wray. "As long as China continues to target the US and our
partners, the FBI will continue to send a clear message that cyber espionage
will not be tolerated, and we will tirelessly pursue those who threaten our
nation’s security and prosperity. This indictment underscores our unwavering
commitment to disrupt and deter malicious cyber activity, and safeguard our
citizens, businesses, and critical infrastructure from threats in cyberspace."

“The indictment unsealed today, together with statements from our foreign
partners regarding related activity, shed further light on the PRC Ministry of
State Security’s aggressive cyber espionage and transnational repression
activities worldwide,” said Assistant Attorney General Matthew G. Olsen of the
Justice Department’s National Security Division. “Today’s announcements
underscore the need to remain vigilant to cybersecurity threats and the
potential for cyber-enabled foreign malign influence efforts, especially as we
approach the 2024 election cycle. The Department of Justice will continue to
leverage all tools to disrupt malicious cyber actors who threaten our national
security and aim to repress fundamental freedoms worldwide.”

“These allegations pull back the curtain on China’s vast illegal hacking
operation that targeted sensitive data from U.S. elected and government
officials, journalists, and academics; valuable information from American
companies; and political dissidents in America and abroad. Their sinister scheme
victimized thousands of people and entities across the world, and lasted for
well over a decade,” said U.S. Attorney Breon Peace for the Eastern District of
New York. “America’s sovereignty extends to its cyberspace. Today’s charges
demonstrate my office’s commitment to upholding and protecting that
jurisdiction, and to putting an end to malicious nation state cyber activity.”

“The recent indictments against the Chinese actors reaffirm the FBI’s relentless
dedication to combating cyber threats,” said Assistant Director Bryan Vorndran
of the FBI Cyber Division. “They serve as a reminder that cyber adversaries who
seek to compromise our nation’s systems and target US officials cannot rely on
the cloak of anonymity and will face consequences for their actions.”

“APT31 Group’s practices further demonstrate the size and scope of the PRC’s
state-sponsored hacking apparatus,” said Special Agent in Charge Robert W. “Wes”
Wheeler Jr. of the FBI Chicago Field Office. “FBI Chicago worked tirelessly to
uncover this complex web of alleged foreign intelligence and economic espionage
crimes. Thanks to these efforts, as well as our partnerships with the U.S.
Attorneys’ Offices and fellow Field Offices, the FBI continues to be successful
in holding groups accountable and protecting national security.”

Overview

As alleged in the indictment and court filings, the defendants, along with
dozens of identified PRC Ministry of State Security (MSS) intelligence officers,
contractor hackers, and support personnel, were members of a hacking group
operating in the PRC and known within the cybersecurity community as Advanced
Persistent Threat 31 (the APT31 Group). The APT31 Group was part of a
cyberespionage program run by the MSS’s Hubei State Security Department, located
in the city of Wuhan. Through their involvement with the APT31 Group, since at
least 2010, the defendants conducted global campaigns of computer hacking
targeting political dissidents and perceived supporters located inside and
outside of China, government and political officials, candidates, and campaign
personnel in the United States and elsewhere and American companies.

The defendants and others in the APT31 Group targeted thousands of U.S. and
foreign individuals and companies. Some of this activity resulted in successful
compromises of the targets’ networks, email accounts, cloud storage accounts,
and telephone call records, with some surveillance of compromised email accounts
lasting many years.

Hacking Scheme

The more than 10,000 malicious emails that the defendants and others in the
APT31 Group sent to these targets often appeared to be from prominent news
outlets or journalists and appeared to contain legitimate news articles. The
malicious emails contained hidden tracking links, such that if the recipient
simply opened the email, information about the recipient, including the
recipient’s location, internet protocol (IP) addresses, network schematics, and
specific devices used to access the pertinent email accounts, was transmitted to
a server controlled by the defendants and those working with them. The
defendants and others in the APT31 Group then used this information to enable
more direct and sophisticated targeted hacking, such as compromising the
recipients’ home routers and other electronic devices.

The defendants and others in the APT31 Group also sent malicious tracking-link
emails to government officials across the world who expressed criticism of the
PRC government. For example, in or about 2021, the conspirators targeted the
email accounts of various foreign government individuals who were part of the
Inter-Parliamentary Alliance on China (IPAC), a group founded in 2020 on the
anniversary of the 1989 Tiananmen Square protests whose stated purpose was to
counter the threats posed by the Chinese Communist Party to the international
order and democratic principles. The targets included every European Union
member of IPAC, and 43 United Kingdom parliamentary accounts, most of whom were
members of IPAC or had been outspoken on topics relating to the PRC government.

To gain and maintain access to the victim computer networks, the defendants and
others in the APT31 Group employed sophisticated hacking techniques including
zero-day exploits, which are exploits that the hackers became aware of before
the manufacturer, or the victim were able to patch or fix the vulnerability.
These activities resulted in the confirmed and potential compromise of economic
plans, intellectual property, and trade secrets belonging to American
businesses, and contributed to the estimated billions of dollars lost every year
as a result of the PRC’s state-sponsored apparatus to transfer U.S. technology
to the PRC.

Targeting of U.S. Government Officials and U.S. and Foreign Politicians and
Campaigns

The targeted U.S. government officials included individuals working in the White
House, at the Departments of Justice, Commerce, Treasury, and State, and U.S.
Senators and Representatives of both political parties. The defendants and
others in the APT31 Group targeted these individuals at both professional and
personal email addresses. Additionally in some cases, the defendants also
targeted victims’ spouses, including the spouses of a high-ranking Department of
Justice official, high-ranking White House officials, and multiple U.S.
Senators. Targets also included election campaign staff from both major U.S.
political parties in advance of the 2020 election.

The allegations in the indictment regarding the malicious cyber activity
targeting political officials, candidates, and campaign personnel are consistent
with the March 2021 Joint Report of the Department of Justice and the Department
of Homeland Security on Foreign Interference Targeting Election Infrastructure
or Political Organization, Campaign, or Candidate Infrastructure Related to the
2020 US Federal Elections. That report cited incidents when Chinese
government-affiliated actors “materially impacted the security of networks
associated with or pertaining to U.S. political organizations, candidates, and
campaigns during the 2020 federal elections.” That report also concluded that
“such actors gathered at least some information they could have released in
influence operations,” but which the Chinese actors did not ultimately deploy in
such a manner. Consistent with that conclusion, the indictment does not allege
that the hacking furthered any Chinese government influence operations against
the United States. The indictment’s allegations nonetheless serve to underscore
the need for U.S. (and allied)Links to other government and non-government sites
will typically appear with the “external link” icon to indicate that you are
leaving the Department of Justice website when you click the link. political
organizations, candidates, and campaigns to remain vigilant in their
cybersecurity posture and in otherwise protecting their sensitive information
from foreign intelligence services, particularly in light of the U.S.
Intelligence Community’s recent assessmentLinks to other government and
non-government sites will typically appear with the “external link” icon to
indicate that you are leaving the Department of Justice website when you click
the link. that “[t]he PRC may attempt to influence the U.S. elections in 2024 at
some level because of its desire to sideline critics of China and magnify U.S.
societal divisions.”

Targeting of U.S. Companies

The defendants and others in the APT31 Group also targeted individuals and
dozens of companies operating in areas of national economic importance,
including the defense, information technology, telecommunications, manufacturing
and trade, finance, consulting, legal, and research industries. The defendants
and others in the APT31 Group hacked and attempted to hack dozens of companies
or entities operating in these industries, including multiple cleared defense
contractors who provide products and services to the U.S. military, multiple
managed service providers who managed the computer networks and security for
other companies, a leading provider of 5G network equipment, and a leading
global provider of wireless technology, among many others.

Targeting for Transnational Repression of Dissidents

The defendants and the APT31 Group also targeted individual dissidents around
the world and other individuals who were perceived as supporting such
dissidents. For example, in 2018, after several activists who spearheaded Hong
Kong’s Umbrella Movement were nominated for the Nobel Peace Prize, the
defendants and the APT31 Group targeted Norwegian government officials and a
Norwegian managed service provider. The conspirators also successfully
compromised Hong Kong pro-democracy activists and their associates located in
Hong Kong, the United States, and other foreign locations with identical
malware.

The charged defendants’ roles in the conspiracy consisted of testing and
exploiting the malware used to conduct these intrusions, managing infrastructure
associated with these intrusions, and conducting surveillance and intrusions
against specific U.S. entities. For example:

 * Cheng Feng, Sun Xiaohui, Weng Ming, Xiong Wang, and Zhao Guangzong were
   involved in testing and exploiting malware, including malware used in some of
   these intrusions.
 * Cheng and Ni Gaobin managed infrastructure associated with some of these
   intrusions, including the domain name for a command-and-control server that
   accessed at least 59 unique victim computers, including a telecommunications
   company that was a leading provider of 5G network equipment in the United
   States, an Alabama-based research corporation in the aerospace and defense
   industries, and a Maryland-based professional support services company.
 * Sun and Weng operated the infrastructure used in an intrusion into a U.S.
   company known for its public opinion polls. Sun and Peng Yaowen conducted
   research and reconnaissance on several additional U.S. entities that were
   later the victims of the APT31 Group’s intrusion campaigns.
 * Ni and Zhao sent emails with links to files containing malware to PRC
   dissidents, specifically Hong Kong legislators and democracy advocates, as
   well as targeting U.S. entities focusing on PRC-related issues.

Assistant U.S. Attorneys Douglas M. Pravda, Saritha Komatireddy, and Jessica
Weigel for the Eastern District of New York are prosecuting the case, with
valuable assistance from Matthew Anzaldi and Matthew Chang of the National
Security Division’s National Security Cyber Section.

An indictment is merely an allegation. All defendants are presumed innocent
until proven guilty beyond a reasonable doubt in a court of law.

Updated April 8, 2024

--------------------------------------------------------------------------------

Topics
Cybercrime
Countering Nation-State Threats
Components
Office of the Attorney General
Federal Bureau of Investigation (FBI)
National Security Division (NSD)
Office of the Deputy Attorney General
USAO - New York, Eastern
Press Release Number: 24-342



RELATED CONTENT

Press Release
Russian National Indicted for Series of Ransomware Attacks

The Justice Department today unsealed an indictment charging Russian
national Aleksandr Viktorovich Ryzhenkov (Александр Викторович Рыженков) with
using the BitPaymer ransomware variant to attack numerous victims in Texas and
throughout the United States...

October 1, 2024
Press Release
Two Russian Nationals Charged in Connection with Operating Billion Dollar Money
Laundering Services

The Justice Department today announced actions coordinated with the Department
of State, Department of the Treasury, and other federal and international law
enforcement partners to combat Russian money laundering operations...

September 26, 2024
Video
Attorney General Merrick B. Garland Addresses the Justice Department Workforce
September 12, 2024

 * Office of Public Affairs
   U.S. Department of Justice
   950 Pennsylvania Avenue, NW
   Washington DC 20530

 * Office of Public Affairs Direct Line
   202-514-2007
   
   Department of Justice Main Switchboard
   202-514-2000

 * Signup for Email UpdatesLinks to other government and non-government sites
   will typically appear with the “external link” icon to indicate that you are
   leaving the Department of Justice website when you click the link.
   Social Media
   
    * twitter
    * facebook
    * youtube
    * instagram
    * linkedin

 * About
 * Archives
 * FOIA
   

 * Accessibility
 * Legal Policies & Disclaimers
 * Privacy
 * For Employees

 * Office of the Inspector General
 * No FEAR Act Data
 * Vulnerability Disclosure

 * Español
 * Vote.govLinks to other government and non-government sites will typically
   appear with the “external link” icon to indicate that you are leaving the
   Department of Justice website when you click the link.
   

Have a question about Government Services?

 * Contact USA.govLinks to other government and non-government sites will
   typically appear with the “external link” icon to indicate that you are
   leaving the Department of Justice website when you click the link.

Top