• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

More than 570 documents reported to be from a Chinese state-backed hacking group were posted online.

realDonaldTrump

Alfrescian
Loyal
More than 570 documents reported to be from a Chinese state-backed hacking group were posted online.

A reported trove of leaked Chinese hacking documents may have given the world a glimpse of how widespread and effective China's hacking operations could be.

More than 570 files and documents were posted to the developer platform GitHub last week, The Washington Post reported. They appear to document hacking activity across multiple countries and come from iSoon, which the Post identified as a private security contractor with ties to China's Ministry of Public Security.

https://www.yahoo.com/news/cache-leaked-chinese-hacking-documents-083355524.html
 
Last edited:

realDonaldTrump

Alfrescian
Loyal

Leaked files from Chinese firm show vast international hacking effort​

https://www.washingtonpost.com/world/2024/02/21/china-hacking-leak-documents-isoon/

A trove of leaked documents from a Chinese state-linked hacking group shows that Beijing’s intelligence and military groups are attempting large-scale, systematic cyber intrusions against foreign governments, companies and infrastructure — with hackers of one company claiming to be able to target users of Microsoft, Apple and Google.
The cache — containing more than 570 files, images and chat logs — offers an unprecedented look inside the operations of one of the firms that Chinese government agencies hire for on-demand, mass data-collecting operations.

The files — posted to GitHub last week and deemed credible by cybersecurity experts, although the source remains unknown — detail contracts to extract foreign data over eight years and describe targets within at least 20 foreign governments and territories, including India, Hong Kong, Thailand, South Korea, the United Kingdom, Taiwan and Malaysia.

“We rarely get such unfettered access to the inner workings of any intelligence operation,” said John Hultquist, chief analyst of Mandiant Intelligence, a cybersecurity firm owned by Google Cloud. “We have every reason to believe this is the authentic data of a contractor supporting global and domestic cyberespionage operations out of China,” he said.

The documents come from iSoon, also known as Auxun, a Chinese firm headquartered in Shanghai that sells third-party hacking and data-gathering services to Chinese government bureaus, security groups and state-owned enterprises.
 

realDonaldTrump

Alfrescian
Loyal
iSoon files contain complaints from disgruntled employees over poor pay and workload. Many hackers work for less than $1,000 a month, surprisingly low pay even in China, said Adam Kozy, a former FBI analyst who is writing a book on Chinese hacking. The leaks hint at infighting and dissatisfaction in the network of patriotic Chinese hackers, despite the long-standing collaboration between groups.

FBI: Chinese hackers outnumbered us 50:1
https://www.fbi.gov/news/speeches/d...lect-committee-on-the-chinese-communist-party
 
Top