Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

11/1/2018
07:00 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

DoJ Charges 10 Chinese Nationals in Elaborate Cyberespionage Case

The Justice Department has indicted 10 Chinese nationals as part of an elaborate cyberespionage case that involved stealing plans for a new turbonfan engine and infecting computers with malware.

The US Justice Department has charged a group of ten Chinese nationals for participating in an elaborate cyberespionage campaign that included infecting company computers with malware in order to steal plans and designs for a newly developed turbofan engine.

Those indicted include two Chinese intelligence officers, along with several "hackers" working at their direction, as well as pair of company insiders who helped with the espionage plan, according to the DoJ.

The DoJ announced the indictments October 30, although none of those charged are in US custody.

In a statement, federal prosecutors detailed an elaborate scheme, which continued from January 2010 to May 2015, that involved spearphishing campaigns, infecting a number of different company computers with different strains of malware and using websites as watering holes to compromise other sites. Domains were also hijacked and compromised.

(Source: iStock)
(Source: iStock)

Some of the malware included Sakula, a Remote Acccess Trojan (RAT) that has been active since at least 2012.

At the heart of the indicted are charges against two Chinese intelligence officers, Zha Rong and Chai Meng, who the Justice Department claims are part of the Jiangsu Province Ministry of State Security (JSSD), which is headquartered in Nanjing.

The JSSD is a provincial foreign intelligence arm of the People's Republic of China's Ministry of State Security (MSS), according to the indictment. The MSS and the JSSD are "primarily responsible for domestic counter-intelligence, non-military foreign intelligence, and aspects of political and domestic security," according to the Justice Department.

The espionage campaign involved the two intelligence officers, along with a group of hackers -- Zhang-Gui, Liu Chunliang, Gao Hong Kun, Zhuang Xiaowei, and Ma Zhiqi -- who attempted to steal the technology and plans for a turbonfan, which was being developed by a French company with help from a US firm.

The French firm had a secondary office in Suzhou, China, and the intelligence officer recruiter two insiders, Gu Gen and Tian Xi, to help with the espionage campaign. At the same time, the hackers in the group were able to penetrate companies in Arizona, Massachusetts and Oregon that were supplying parts for the engine.

The indictment indicates that the group was helping the government of China to stay competitive. "At the time of the intrusions, a Chinese state-owned aerospace company was working to develop a comparable engine for use in commercial aircraft manufactured in China and elsewhere," according to the DoJ statement.

The espionage continued for several years until the Oregon company found the malware, cleansed it from its computers and systems and alerted authorities. The Justice Department and the FBI then began investigating the case, which took more than three years to complete

While it's doubtful whether any of the individuals mentioned in Tuesday's indictment will be brought to the US to face charges, the Justice Department recently announced the arrest of another Chinese spy, who was detained in Belgium and has now been sent to the US to face trial.

In an email, Sean Sullivan, a security advisor at cybersecurity firm F-Secure, noted that these indictments come as the US and China are engaged in a trade war and these allegation might serve as a way for the US to gain leverage over China as negotiations continue.

Sullivan also noted that China's spying efforts have been ramped up as of late.

"It's also interesting to see that the Chinese Ministry of State Security (MSS) have combined human intelligence and cyber espionage together, which shows that the infection vector doesn't always need to be virtual -- it can also be physical," Sullivan wrote.

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...