HomeSecurity OperationsSanctions imposed on Chinese hacker and data broker

Sanctions imposed on Chinese hacker and data broker

Published on

spot_img

The Department of Justice has revealed indictments against individuals from a Chinese tech company and officers from China’s Ministry of Public Security for various hacking-related offenses. Among those charged are Zhou Shuai and Yin Kecheng, along with eight employees of i-Soon. Additionally, the Diplomatic Security Service’s Rewards for Justice Program is offering up to $10 million for information on i-Soon, its employees, and the MPS officers involved in cyber activities outlined in the indictments.

Moreover, the United States has imposed sanctions on Shanghai-based cyber actor and data broker Zhou Shuai, as well as his company, Shanghai Heiying Information Technology Company. Zhou Shuai stands accused of illegally acquiring and selling data from critical U.S. infrastructure networks, including those in defense, communications, health, and government sectors. The Department of State has also announced reward offers under the Transnational Organized Crime Rewards Program for information leading to the capture of Zhou Shuai and Yin Kecheng.

The revelation of these indictments sheds light on China’s role in harboring private sector companies engaged in cyber malpractice against the U.S. and its allies. It is apparent that the Chinese Communist Party not only tolerates such activities but may also contract them, indicating varying levels of control and effectiveness. This continues to pose a significant threat to U.S. national security, with China-backed cyber actors being identified as a persistent menace.

The joint effort displayed by multiple agencies underscores a comprehensive approach to safeguarding against cyber threats originating from China. President Trump has reiterated his commitment to protecting American citizens and critical infrastructure from these ongoing dangers and has reaffirmed the administration’s determination to utilize all available resources to combat such threats effectively.

This latest development serves as a stark reminder of the complex nature of cyber warfare and the need for continuous vigilance in safeguarding sensitive information and critical systems. As the U.S. authorities intensify their efforts to counter malicious cyber activities, it is evident that a coordinated strategy involving various stakeholders is essential to ensure national security and protect against evolving cyber threats.

Source link

Latest articles

Centralized management solutions for NHIs in IAM.

In today's digital era, the management of Non-Human Identities (NHIs) within Identity and Access...

Data Breach reported by Converse University

Converse University in Spartanburg, South Carolina, recently made headlines after facing a significant data...

Analyzing the Condition of IGA

In today's fast-paced digital landscape, organizations are grappling with the challenges posed by the...

Concerns, Emerging Patterns, and Resolutions in Cyber Attacks

HealthEquity, a prominent Health Savings Account (HSA) custodian, experienced a significant setback as its...

More like this

Centralized management solutions for NHIs in IAM.

In today's digital era, the management of Non-Human Identities (NHIs) within Identity and Access...

Data Breach reported by Converse University

Converse University in Spartanburg, South Carolina, recently made headlines after facing a significant data...

Analyzing the Condition of IGA

In today's fast-paced digital landscape, organizations are grappling with the challenges posed by the...