After a leak of a series of sensitive documents, detailed insight into how the Chinese government uses the private sector as part of its politically motivated hacking operations at home and abroad has emerged.
The revelations come from information leaked from inside I-Soon — a software company Beijing has hired to provide various services, which range from monitoring ethnic minority groups in China, including the Uighurs, to carrying out intelligence attacks against foreign governments, including India, Thailand, Vietnam, and South Korea.
The leak occurred in February via GitHub — a specialist website for cybersecurity and IT professionals — where they share programming code and the latest network developments.
It provided a rare insight into who is helping Beijing in these efforts and into the activities of key groups affiliated with the Chinese government, groups known in the industry as APTs.
Reports have indicated a link between I-Soon and APT-41, which has targeted various industries such as healthcare, telecommunications, and technology since 2012.
This is the story of how the leak happened, what its revelations mean and what they tell us about the size and scope of the companies involved in a state-of-the-art hacking campaign.
Stolen documents
In mid-January, an individual – who remains anonymous – accessed GitHub using an email address reading “[email protected]”. About a month later, files and documents stolen from I-Soon – which is also known as Anxun Information Technology – were published.
Since then, there has been speculation that the leaker may be a former company employee retaliating for being fired. Such breaches are known in the cybersecurity industry as “insider threats”.
The I-Soon leak revealed that the company was working for Chinese security agencies, including the Ministry of State Security, the Ministry of Public Security, and the People's Liberation Army. For providing sensitive information to Vietnam's Ministry of Economy, it received up to $55,000.
The leaks also show how the Chinese government recruits other individuals and companies. The details show that a local government in a southwestern Chinese province paid about $15,000 to obtain information that allowed them to access Vietnam's road network.
Additionally, Chinese government entities can purchase software for $10,000 that allows them to run campaigns on the popular social media platform X.
These modest amounts are modest, but their significance runs beyond price. I-Soon's activities show what China’s hackers are capable of and how much they cost.
Hackers for hire
In effect, the leaks reveal the development of a new kind of commercial entity in China, providing intelligence services and also seeking to influence public opinion.
I-Soon does not just fulfil government contracts. Its services are also available to private companies. It has the ability to access Windows, Mac, and Android operating systems.
The company also produced a device resembling a portable charger that allows Chinese hackers to transfer the personal data of victims using the device to the company's databases. In addition, the company manufactured devices that can crack Wi-Fi network passwords.
The leak also reveals that smaller companies are involved in government-sponsored hacking.