Home » Technology » China’s Cyber Elite: A History of Patriotic Hackers

China’s Cyber Elite: A History of Patriotic Hackers

From hacker Groups to State-sponsored Espionage: China’s Evolving Cyber Landscape

The shadowy world of elite hacking groups, once the domain of patriotic youths and underground coders, has evolved into a sophisticated, state-sanctioned apparatus for intelligence gathering and cyber conflict in China. A deep dive into the origins and evolution of some of China’s most notorious hacking collectives reveals a clear trajectory from independent cyber operations to deeply integrated state-sponsored espionage, with former members now at the forefront of lucrative private cybersecurity firms allegedly working for government agencies.

The genesis of this transition can be traced back to the late 1990s and early 2000s, a period marked by the emergence of influential hacker groups like the green Army and Honker Union.These collectives were responsible for developing and disseminating powerful cyber tools that would later become staples in the arsenals of Chinese intelligence services.

As a notable example, the release of “Glacier,” a remote-access trojan by a Green Army member, laid the groundwork for sophisticated remote control capabilities. The following year, a collaboration between that same individual and Yang Yong (“coolc”) of XFocus yielded X-Scan, a network vulnerability scanner that remains a tool for hackers in China today. In 2003, the Honker Union contributed HTRAN, a stealth tool designed to obfuscate an attacker’s location by routing traffic through proxy servers – a technique now widely employed by China’s Advanced Persistent Threats (APTs).

The growth of potent backdoors further solidified this connection. Tan and Zhou Jibing (“whg”), both associated with the NCPH, are credited with creating the PlugX backdoor in 2008. This sophisticated piece of malware has been documented in the operations of over a dozen Chinese APTs. Benincasa’s research indicates that Zhou further refined this by developing ShadowPad, a tool now attributed to the operations of APT 41 and others.

The narrative of these hacker groups didn’t end with their initial creations. Over the years, evidence from leaks and US indictments against former Honker members has illuminated their alleged post-group careers, wich increasingly point towards state-sponsored cyber operations. Crucially, these revelations have also exposed china’s utilization of for-profit entities to conduct state hacking operations. Companies like i-Soon and Integrity Tech,both founded by former Honkers,exemplify this shift.

Wu Haibo (“shutdown”),a former member of Green Army and 0x557,launched i-Soon in 2010. This company has recently come under intense scrutiny following a massive leak of internal files and chat logs last year, which exposed its extensive espionage activities on behalf of China’s Ministry of State Security (MSS) and Ministry of Public Security (MPS). The gravity of these operations was underscored by the US indictment of eight i-Soon employees and two MPS officers in March of this year. These individuals are accused of conducting hacking operations targeting U.S. government agencies, Asian foreign ministries, dissidents, and media outlets.Similarly, Integrity Tech, founded in 2010 by Cai Jingjing (“cbird”), a former Green Army operative, faced U.S. sanctions this year due to its alleged involvement in global infrastructure hacks.

The U.S. has also taken action against key individuals. This year, former Green Army members Zhou and Wu were indicted for their alleged involvement in state-sponsored hacking operations. Zhou, in particular, was sanctioned for his links to APT 27. Beyond state-sponsored activities, he is also accused of running a data-leak service, selling stolen data to various clients, including intelligence agencies.

This evolution mirrors, to some extent, the early careers of some U.S. hackers who transitioned into the cybersecurity industry and were later recruited by U.S.intelligence agencies or contracted for government operations. However,experts like Kozy highlight a critical distinction: unlike the U.S. approach, China’s “whole-of-society” intelligence apparatus appears to have actively compelled its citizens and companies to participate in state espionage.

As Kozy observes, china’s initial strategy likely involved co-opting the technical skills of these hacker groups for national interests. Exploiting the patriotic leanings of many young hackers, the state may have framed their contributions as patriotic service. Moreover, the prospect of financial gain also proved to be a significant motivator, as many individuals realized the lucrative potential of aligning their hacking prowess with state objectives. This transition from independent cyber activity to a deeply integrated, state-controlled engine of espionage marks a significant and concerning development in the global cyber landscape.

How did the initial wave of Chinese hacktivism in the 1990s differ in technical sophistication and motivation from the later emergence of state-sponsored APT groups?

China’s Cyber Elite: A History of Patriotic Hackers

The Early Days: Emergence of Chinese Hacktivism (1990s – Early 2000s)

The roots of China’s cyber elite trace back too the mid-1990s, coinciding with the nation’s rapid internet adoption. Early activity wasn’t necessarily state-sponsored, but driven by a burgeoning sense of nationalism and a desire to counter perceived Western dominance online. Thes initial groups, often comprised of self-taught programmers and tech enthusiasts, focused on defacement of foreign websites and basic denial-of-service attacks.

Key Characteristics: Primarily focused on symbolic acts of protest. Limited technical sophistication. Driven by individual or small group initiative.

Early Targets: Websites of countries perceived as opposed to China,particularly those involved in political disputes (e.g., Taiwan, the United States).

Relevant Keywords: Chinese hackers, hacktivism, cyber nationalism, internet censorship, early cyberattacks.

The Rise of APTs: State-Sponsored Cyber Espionage (2000s – 2010s)

The 2000s witnessed a notable shift. The Chinese government began to recognize the strategic importance of cyber warfare and started cultivating a more sophisticated cyber capability. This led to the emergence of Advanced Persistent Threats (APTs) – highly skilled,state-sponsored hacking groups. These groups moved beyond simple vandalism to engage in targeted espionage, intellectual property theft, and strategic data collection.

APT Groups: Notable groups include APT1 (linked to the People’s Liberation Army – PLA), APT30, and APT41. Each group specializes in different targets and techniques.

target Sectors: Critical infrastructure (energy, telecommunications), defense contractors, technology companies, and government agencies were prime targets.

Techniques Employed: Spear phishing, zero-day exploits, supply chain attacks, and custom malware were commonly used.

Relevant Keywords: APT,Advanced Persistent Threat,cyber espionage,state-sponsored hacking,PLA Unit 61398,cyber warfare,intellectual property theft.

The “grate Cannon” and Beyond: Expanding Offensive Capabilities (2015 – Present)

In 2015, researchers discovered the “Great Cannon of China,” a powerful and sophisticated cyberattack tool believed to be operated by the Chinese government. Unlike traditional DDoS attacks, the Great Cannon leveraged compromised servers worldwide to amplify attacks, making attribution substantially more arduous. This demonstrated a clear escalation in China’s offensive cyber capabilities.

The Great Cannon: Used to target GitHub, specifically to disrupt the distribution of anti-censorship tools.

Focus on supply Chain Attacks: Increasingly, Chinese APTs have targeted software supply chains to compromise a wider range of victims. The 2020 solarwinds hack,while attributed to Russia,highlighted the vulnerability of supply chains and prompted increased scrutiny of similar tactics by other nation-states,including China.

Cybercrime & APT Overlap: Groups like APT41 demonstrate a blurring of lines between state-sponsored espionage and financially motivated cybercrime.

Relevant Keywords: Great Cannon, cyberattack tool, supply chain attack, SolarWinds hack, cybercrime, nation-state hacking, zero-day exploit.

Patriotic Hacking Competitions & Talent Advancement

China actively fosters cybersecurity talent through various initiatives, including national hacking competitions like the National Cyber League (NCL) and the China Collegiate cyber Security Competition (CCCSC). These competitions attract thousands of students and professionals, providing a pipeline for identifying and recruiting skilled individuals.

CCCSC: The largest collegiate cybersecurity competition in China,attracting participation from universities across the country.

National Cyber League (NCL): A platform for individuals to showcase thier cybersecurity skills and compete for recognition.

Government Support: The Chinese government provides significant funding and resources to support cybersecurity education and training programs.

Relevant Keywords: cybersecurity competition, hacking competition, cyber talent, cybersecurity education, National Cyber League, CCCSC*.

Legal Framework & Government Oversight

China’s cybersecurity landscape is heavily regulated. The Cybersecurity law of 2017 and subsequent regulations impose strict requirements on data localization, security assessments, and content

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Adblock Detected

Please support us by disabling your AdBlocker extension from your browsers for our website.