Swordsmyth
Member
- Joined
- Apr 14, 2016
- Messages
- 74,737
An anonymous group calling itself Intrusion Truth has exposed members of APT10, an elite Chinese hacking unit that has targeted aerospace, engineering, and manufacturing firms to steal trade secrets, including from the US government.
Since mid-summer, Intrusion Truth has published a list of alleged names of individual APT10 hackers. Sources with knowledge of APT10’s operations told Motherboard some of the details in Intrusion Truth’s blog posts and tweets match other data points on the Chinese group.
"We will work with companies, private analysts, hackers, governments—whoever can provide the data that we need," a spokesperson of Intrusion Truth told Motherboard via email.
"Intellectual property theft is a global confrontation fought between the West and its online adversaries, mainly China. This theft damages hard-working individuals, their companies and entire economies through lost revenue and competition that is completely unfair," Intrusion Truth told Motherboard.
"Until recently, China has been winning—it has acted with impunity, stealing data using commercial hackers that it pays and tasks but later claims are criminals. The use of commercial hackers is a deliberate attempt to circumvent the statements that China has made committing to stop this illegal activity," the group added.
In a first, Intrusion Truth unmasked individual alleged Chinese hackers, posted photographs, and even showed their places of work through Uber receipts. There was even evidence that some hackers were traveling to buildings operated by China’s intelligence agency.
Thomas Rid, a professor at Johns Hopkins University, told Motherboard this kind of internet sleuthing is advance, and the language skills, tools and research abilities to pull off something like this is of a professional.
"It’s somebody who is professional,” he said, “somebody who knows what they’re doing."
According to one theory, the group may work for a corporate victim of Chinese hackers.
Intrusion Truth has posted 40 tweets to Twitter dating back from April 2017 and more than a dozen articles to the blog site Medium over the past year. In them is evidence linking Chinese companies to a suspected China-backed hacking group known as APT 3 and another known as APT 10, or Stone Panda, giving the public an understanding of the continued threat of Chinese hacking.
"APT 10 is one of the most active groups we track," said Mr. Read. The group has hacked multinationals from Japan, Europe, and US.
Intrusion Truth focused on several Chinese companies, alleging they are connected to government-backed hacking programs.
"We are focusing our efforts on determining whether these are just ‘companies that hack,’ or would they be better described as fronts enabling the Chinese state to employ hackers who can later be scapegoated as criminals?" Intrusion Truth tweeted in August.
Last year, Intrusion Truth said two employees of Guangdong Bo Yu Information Technology Co., were part of APT 3. Six months later, US officials indicted the men—Wu Yingzhuo and Dong Hao—saying they were involved in hacking Moody’s Analytics and Siemens AG.
Intrusion Truth also linked internet domains and email addresses associated with websites used by APT 10 to two other Chinese companies, Tianjin Huaying Haitai Science and Technology Development Co. and Laoying Baichaun Instruments Equipment Co.
"We will never name ourselves or those who work with us. Our ability to contest China's despicable activities in Cyberspace is derived precisely from our anonymity," Intrusion Truth concluded. "That, and our willingness to tell the whole truth."
More at: https://www.zerohedge.com/news/2018...h-mysterious-group-doxing-chinas-hacking-army

Since mid-summer, Intrusion Truth has published a list of alleged names of individual APT10 hackers. Sources with knowledge of APT10’s operations told Motherboard some of the details in Intrusion Truth’s blog posts and tweets match other data points on the Chinese group.
APT10 was managed by the Tianjin State Security Bureau, a regional arm of China's Intelligence Service, the Ministry of State Security #apt10 #menupass #tianjin #mss #china @fisherxp @baobeilong https://t.co/7CqSJLsER1 pic.twitter.com/JfwyzMKQnU
— Intrusion Truth (@intrusion_truth) August 15, 2018
Intrusion Truth's controversial approach of anonymously unmasking government-backed hackers and exposing a foreign intelligence agency is something new and seen as a method to put pressure on Chinese companies cooperating with state-sponsored hacking efforts.— Intrusion Truth (@intrusion_truth) August 15, 2018
"We will work with companies, private analysts, hackers, governments—whoever can provide the data that we need," a spokesperson of Intrusion Truth told Motherboard via email.
"Intellectual property theft is a global confrontation fought between the West and its online adversaries, mainly China. This theft damages hard-working individuals, their companies and entire economies through lost revenue and competition that is completely unfair," Intrusion Truth told Motherboard.
"Until recently, China has been winning—it has acted with impunity, stealing data using commercial hackers that it pays and tasks but later claims are criminals. The use of commercial hackers is a deliberate attempt to circumvent the statements that China has made committing to stop this illegal activity," the group added.
In a first, Intrusion Truth unmasked individual alleged Chinese hackers, posted photographs, and even showed their places of work through Uber receipts. There was even evidence that some hackers were traveling to buildings operated by China’s intelligence agency.
Thomas Rid, a professor at Johns Hopkins University, told Motherboard this kind of internet sleuthing is advance, and the language skills, tools and research abilities to pull off something like this is of a professional.
"It’s somebody who is professional,” he said, “somebody who knows what they’re doing."
According to one theory, the group may work for a corporate victim of Chinese hackers.
Intrusion Truth has posted 40 tweets to Twitter dating back from April 2017 and more than a dozen articles to the blog site Medium over the past year. In them is evidence linking Chinese companies to a suspected China-backed hacking group known as APT 3 and another known as APT 10, or Stone Panda, giving the public an understanding of the continued threat of Chinese hacking.
"APT 10 is one of the most active groups we track," said Mr. Read. The group has hacked multinationals from Japan, Europe, and US.
Intrusion Truth focused on several Chinese companies, alleging they are connected to government-backed hacking programs.
"We are focusing our efforts on determining whether these are just ‘companies that hack,’ or would they be better described as fronts enabling the Chinese state to employ hackers who can later be scapegoated as criminals?" Intrusion Truth tweeted in August.
Last year, Intrusion Truth said two employees of Guangdong Bo Yu Information Technology Co., were part of APT 3. Six months later, US officials indicted the men—Wu Yingzhuo and Dong Hao—saying they were involved in hacking Moody’s Analytics and Siemens AG.
Intrusion Truth also linked internet domains and email addresses associated with websites used by APT 10 to two other Chinese companies, Tianjin Huaying Haitai Science and Technology Development Co. and Laoying Baichaun Instruments Equipment Co.
"We will never name ourselves or those who work with us. Our ability to contest China's despicable activities in Cyberspace is derived precisely from our anonymity," Intrusion Truth concluded. "That, and our willingness to tell the whole truth."
More at: https://www.zerohedge.com/news/2018...h-mysterious-group-doxing-chinas-hacking-army