How China’s Patriotic Patriotism became China’s elite presenter
Topsec and Venustech were two firms that are said to have helped these efforts. Topsec has applied a number of former Hankers, including the founder of the China Honker Union, and the founder of Topsec once acknowledged in an interview that PLA guided its company. In 2015, Topsec was linked to government -backed cyber operations, including violations of anthem insurance in the United States.
Over the years, many of the tools used in Chinese APT groups were made by Honkers, and PLA and MSS extracted them for vulnerability research and development. In 1999, Huang Sheen (Refrigerator), a member of the Green Army, released “Refrigerator”, a long -distance Trojan. The following year, he and Yang Jung (COOLC) released XFocus X-Scan, a tool to scan vulnerable networks still used by hackers in China today. In 2003, two Honker members released the HTRAN Union, a tool to hide the invading location by reuse their traffic through proxy computers, used by China’s APS. It is believed that TAN and NCPH member NCPH (WHG) in 2008 created Backdoor Plugx used by more than 10 Chinese APTs. According to Beninsa, Zhou developed it even more for the production of ShadowPad, used by APT 41 and others.
Over the years, the US leak and indictment against the former jokes has exposed the claim of spy jobs after Honker, as well as China’s use of profit companies for government hacking operations. The latter consists of I-Soon technology and integrity, both launched by the former Honcon.
Wu Hibu, formerly of the Green Army and 0x557, launched I-Soon in 2010. And last year, somebody disclosed internal and internal chat cases and exposed the company’s espionage on behalf of MSS and MPs. In March this year, eight employees were accused by the United States soon and two MPs for hacking operations targeted by US government agencies, the Asian foreign ministries, opposition and the media.
Technology integrity, founded in 2010 by a former member of the Green Army of Kai Jingjing (CBIRD), was boycotted by the United States this year for relations with global infrastructure hacks.
This year, the United States also accused former members of the Green Army of Zhou and Wu for conducting state hacking operations and sanctioned Zhou at APT 27 for links. In addition to being involved in government -sponsored hacking, he also transferred a rough data service to the sale of some stolen data, including intelligence agencies.
It is not unlike the American hackers, which are also being transferred to become the founders of the Cyber Security Company, as well as hired by the National Security Agency and the Central Intelligence Agency or hired by contractors to carry out hack operations for US operations. Kozzi points out that, unlike the United States, all intelligence officials in the community have forced some Chinese citizens and companies to cooperate with the government in spying.
“I think that China just thought only,” we can cooperate [the Honkers] For the interests of the state. “” Kozzi says. Also, many of them realized that they could get rich and do it. “