Article Details
Scrape Timestamp (UTC): 2025-03-06 00:53:36.246
Source: https://www.theregister.com/2025/03/06/fbi_china_pays_75k_per/
Original Article Text
Click to Toggle View
Feds name and charge alleged Silk Typhoon spies behind years of China-on-US attacks. Xi's freelance infosec warriors apparently paid up to $75K to crack a single American inbox. US government agencies announced Wednesday criminal charges against alleged members of China's Silk Typhoon gang, plus internet domain seizures linked to a long-term Chinese espionage campaign that saw Beijing hire miscreants to compromise US government agencies and other major orgs. "For years, the PRC government [People’s Republic of China] – in particular, its Ministries of State and Public Security – have encouraged, supported and relied on private contractors and Chinese technology companies to hack and steal information in a manner that hides the government's involvement, essentially providing it the form of plausible deniability," a Justice Department official said on a call with reporters attended by The Register earlier today. A representative of the FBI also spoke on the call, which covered matters including freshly unsealed indictments that name 12 Chinese nationals charged for their suspected roles in a Chinese government operation to compromise computers and steal data from high-profile targets, including the US Treasury. Two of these individuals are alleged to be officers at China’s Ministry of Public Security (MPS). We’re told the other ten named suspects are employees of a private firm, Anxun Information Technology, better known as i-Soon, and members of China's APT27, aka Silk Typhoon. "Each of these defendants played a critical role in the PRC government hacker-for-hire ecosystem, which by any measure, has gotten out of control," a Justice Department official said on the call. The digital snoops broke into victims' computers at the direction of China's MPS and its Ministry of State Security (MSS). Sometimes they attacked when working for i-Soon, it is claimed. On other occasions they acted alone, "motivated by profit," according to the DOJ official on the call. This scheme netted millions for i-Soon and China's freelance infosec warriors, American prosecutors say. "i-Soon charged the MSS and MPS between approximately $10,000 and $75,000 per email inbox hacked," the FBI official said. "i-Soon then charged the MSS and MPS additional fees to analyze the stolen data." While we don't have specific details about which email inboxes scored the biggest payouts, it's safe to say they weren't your average Gmail accounts because Silk Typhoon is the same crew behind the 2021 Microsoft Exchange Server zero-day exploits that targeted Western governments’ intelligence and defense agencies (Microsoft used to track this group as Hafnium.) The Justice Department today also announced the court-authorized seizure [PDF] of i-Soon internet domains, which the Feds tied to the December 2024 Treasury Department network intrusions and other digital break-ins. The seizure warrant names Yin KeCheng and Zhou Shuai, who were both indicted in 2023, as having "facilitated and profited from some of the most significant Chinese-based computer network exploitation schemes against US victims." Both men, according to the Feds, are members of Silk Typhoon and part of the larger Chinese hacker-for-hire ecosystem. Two indictments [PDF], unsealed today, formally charge Yin and Zhou for their alleged involvement in for-profit computer intrusion campaigns that date back to 2013. Their US victims, according to the court documents, included: A third indictment [PDF] charges the other 10 people: Wu Haibo, chief executive officer of i-Soon; Chen Cheng, its chief operating officer; sales boss Wang Zhe; and technical staff Liang Guodong, Ma Li, Wang Yan, Xu Liang, and Zhou Weiwei; and what's said to be MPS officers Wang Liyu and Sheng Jing. Today’s disclosures from the Feds echo a Microsoft report, also released on Wednesday, that blamed Silk Typhoon for ongoing attacks against IT companies and government agencies. There’s little chance that the Chinese government will allow US authorities to arrest any of those named today. The State Department has offered bounties of up to $2 million for information leading to the arrest and/or conviction of alleged Silk Typhoon members KeCheng and Shai. The criminal charges and domain seizures follow a series of US government alerts over the past year about Chinese snoops burrowing into American networks. "You look at Volt Typhoon, Flax Typhoon, Salt Typhoon, Silk Typhoon — all this activity demonstrates persistent targeting of US interests by the [Chinese Communist Party] CCP," the Justice Department official said on the briefing call.
Daily Brief Summary
The US has charged 12 Chinese nationals linked to the Silk Typhoon espionage group and seized related internet domains.
These individuals are accused of hacking into US computer systems on behalf of China’s Ministries of State and Public Security.
The accused include two members of China’s Ministry of Public Security and ten employees from the tech firm Anxun Information Technology, also known as i-Soon.
i-Soon allegedly charged between $10,000 and $75,000 to hack email inboxes for the Chinese government, with additional fees for data analysis.
The hackers targeted high-profile agencies including the US Treasury, exploiting vulnerabilities like those seen in the Microsoft Exchange Server.
This operation has been part of the broader Chinese strategy of employing hacker-for-hire services to perform state-sponsored espionage while maintaining plausible deniability.
The US State Department is offering up to $2 million for information leading to the arrest or conviction of the key members of Silk Typhoon.
The Justice Department claims this scheme has generated millions of dollars and caused significant breaches of US data security.