Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: US Indicts 12 Chinese Nationals in Wide-Scale Hacking Scheme
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

US Indicts 12 Chinese Nationals in Wide-Scale Hacking Scheme

Highlights

  • US charges 12 Chinese nationals for extensive cyber espionage.

  • Targets included federal agencies, dissidents, and foreign ministries.

  • State Department offers rewards for information on cybercriminals.

Kaan Demirel
Last updated: 5 March, 2025 - 11:39 pm 11:39 pm
Kaan Demirel 2 months ago
Share
SHARE

The U.S. Justice Department has charged twelve Chinese nationals for their roles in an extensive espionage campaign targeting American federal and state agencies. This operation, allegedly state-backed, included a significant cyberattack on the Treasury Department in late 2024. The indictment highlights a systematic effort to breach multiple networks and extract sensitive data over more than a decade.

Contents
How Did the Chinese Hackers Operate?Who Were the Primary Targets?What Are the US Responses?

Previous reports have documented Chinese cyber activities, but this latest development underscores the persistent and evolving nature of state-sponsored hacking efforts. Earlier incidents mainly targeted specific industries, whereas the current charges reveal a broader and more organized approach to espionage.

How Did the Chinese Hackers Operate?

The indicted individuals, including members of China’s Ministry of Public Security and employees from Anxun Information Technology Co. Ltd. (i-Soon), operated within a hacker-for-hire framework. They conducted unauthorized access to email accounts, cellphones, servers, and websites, selling the stolen data to Chinese intelligence agencies. Their operations spanned from 2011 to 2024, employing both targeted and speculative attacks.

Who Were the Primary Targets?

The cyberattacks affected a wide range of victims, including U.S.-based critics, dissidents, a major religious organization, and various foreign ministries across Asia. Notable targets involved the U.S. Defense Intelligence Agency, the Department of Commerce, and several New York-based newspapers and government bodies. This diverse victim pool illustrates the broad objectives of the espionage campaign.

What Are the US Responses?

In response to these indictments, the State Department has offered rewards of up to $10 million for information leading to the apprehension of individuals involved in cyber activities against U.S. critical infrastructure. Additionally, sanctions have been imposed on entities and individuals linked to the attacks, and efforts to seize domains associated with the hackers are ongoing. “Today, we are exposing the Chinese government agents directing and fostering indiscriminate and reckless attacks against computers and networks worldwide,” stated Sue J. Bai, head of the Justice Department’s National Security Division.

“The defendants in these cases have been hacking for the Chinese government for years, and these indictments lay out the strong evidence showing their criminal wrongdoing,”

emphasized U.S. Attorney Edward R. Martin, Jr. The move aims to deter future cyber espionage and hold accountable those facilitating such activities on behalf of the Chinese government.

The coordinated nature of these cyberattacks reveals the depth of collaboration between Chinese government entities and private hacking groups. By leveraging companies like i-Soon, China has been able to obscure direct government involvement while efficiently conducting large-scale espionage operations globally.

Future implications of these indictments suggest a heightened vigilance and potentially stricter measures against state-sponsored cyber threats. Businesses and government agencies may need to bolster their cybersecurity defenses in response to the evolving tactics revealed by these charges.

Addressing the sophisticated methods and extensive reach of the indicted hackers provides valuable lessons for enhancing national security measures and protecting sensitive information from similar future threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Trump Urges Colorado to Release Jailed Clerk Over Election Breach

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Best Practices for Using QR Codes Safely
Next Article Tesla to Build Megapack Plant in Waller County

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Master Your Wordle Strategy with Expert Tips
Gaming
Giant Bomb Returns to Independent Roots After Staff Acquisition
Gaming
Nintendo Gives Itself Power to Disable Consoles
Gaming
Standard Bots Unveils Robot Arm and Expands U.S. Facility
Robotics
Samsung Offers Discounts on the Galaxy Watch Ultra Purchase
Wearables
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?