HomeSecurity OperationsSanctions imposed on Chinese hacker and data broker

Sanctions imposed on Chinese hacker and data broker

Published on

spot_img

The Department of Justice has revealed indictments against individuals from a Chinese tech company and officers from China’s Ministry of Public Security for various hacking-related offenses. Among those charged are Zhou Shuai and Yin Kecheng, along with eight employees of i-Soon. Additionally, the Diplomatic Security Service’s Rewards for Justice Program is offering up to $10 million for information on i-Soon, its employees, and the MPS officers involved in cyber activities outlined in the indictments.

Moreover, the United States has imposed sanctions on Shanghai-based cyber actor and data broker Zhou Shuai, as well as his company, Shanghai Heiying Information Technology Company. Zhou Shuai stands accused of illegally acquiring and selling data from critical U.S. infrastructure networks, including those in defense, communications, health, and government sectors. The Department of State has also announced reward offers under the Transnational Organized Crime Rewards Program for information leading to the capture of Zhou Shuai and Yin Kecheng.

The revelation of these indictments sheds light on China’s role in harboring private sector companies engaged in cyber malpractice against the U.S. and its allies. It is apparent that the Chinese Communist Party not only tolerates such activities but may also contract them, indicating varying levels of control and effectiveness. This continues to pose a significant threat to U.S. national security, with China-backed cyber actors being identified as a persistent menace.

The joint effort displayed by multiple agencies underscores a comprehensive approach to safeguarding against cyber threats originating from China. President Trump has reiterated his commitment to protecting American citizens and critical infrastructure from these ongoing dangers and has reaffirmed the administration’s determination to utilize all available resources to combat such threats effectively.

This latest development serves as a stark reminder of the complex nature of cyber warfare and the need for continuous vigilance in safeguarding sensitive information and critical systems. As the U.S. authorities intensify their efforts to counter malicious cyber activities, it is evident that a coordinated strategy involving various stakeholders is essential to ensure national security and protect against evolving cyber threats.

Source link

Latest articles

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

More like this

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...