Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Anori, Alphabet’s new X spinout, faces one of the world’s most expensive bureaucratic nightmares

K2 will launch its first high-powered computing satellite into space

Multiverse Computing is pushing its compressed AI models into the mainstream

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Multiverse Computing is pushing its compressed AI models into the mainstream

    19 March 2026

    Sam Altman’s thank you to coders draws memes

    19 March 2026

    The Pentagon is developing alternatives to Anthropic, the report said

    18 March 2026

    Mistral bets on ‘build your own AI’, as with OpenAI, Anthropic in business

    18 March 2026

    Picsart Now Lets Creators ‘Hire’ AI Assistants Through Agent Market

    17 March 2026
  • Apps

    Amazon is bringing Alexa+ to the UK

    19 March 2026

    Rebel Audio is a new AI podcasting tool aimed at first-time creators

    19 March 2026

    Google’s Personal Intelligence feature is expanding to all US users

    18 March 2026

    Kagi brings its “small web” of an all-human web to mobile devices

    18 March 2026

    Gamma adds AI image creation tools in a bid to take on Canva and Adobe

    17 March 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

    17 March 2026

    Fuse raises $25M to disrupt legacy loan origination systems used by US credit unions

    16 March 2026

    India neobank Fi removes banking services on its platform

    11 March 2026

    X taps William Shatner to give invitations to his payment service, X Money

    4 March 2026

    Stripe wants to turn your AI costs into a profit center

    3 March 2026
  • Hardware

    CEO Carl Pei says nothing about smartphone apps disappearing as they’re replaced by artificial intelligence agents

    18 March 2026

    MacBook Neo, AirPods Max 2, iPhone 17e and everything else Apple announced this month

    18 March 2026

    Oura enters India’s smart ring market with Ring 4

    17 March 2026

    Apple quietly launches AirPods Max 2

    17 March 2026

    The MacBook Neo is “the most repairable MacBook” in years, according to iFixit

    16 March 2026
  • Media & Entertainment

    Patreon CEO calls AI companies’ fair use argument ‘bogus’, says creators should be paid

    18 March 2026

    Meet Vurt, the first mobile streaming platform for indie filmmakers embracing vertical video

    18 March 2026

    BuzzFeed debuts AI applications for new revenue

    17 March 2026

    Facebook makes it easy for creators to report copycats

    14 March 2026

    Spotify will let you edit your taste profile to control your recommendations

    13 March 2026
  • Security

    FBI is buying location data to track US citizens, director confirms

    19 March 2026

    Russians caught stealing personal data from Ukrainians with new advanced iPhone hacking tools

    18 March 2026

    Stryker says it is restoring systems after pro-Iranian hackers wiped out thousands of employee devices

    17 March 2026

    Wiz Investor Unpacks Google’s $32 Billion Acquisition

    15 March 2026

    Law enforcement shuts down botnet consisting of tens of thousands of hacked routers

    12 March 2026
  • Startups

    Anori, Alphabet’s new X spinout, faces one of the world’s most expensive bureaucratic nightmares

    19 March 2026

    This startup wants to make enterprise software more like a prompt

    19 March 2026

    H&M wants to make clothes out of CO2 using this startup’s technology

    18 March 2026

    Why Garry Tan’s Claude Code setup has gotten so much love and hate

    18 March 2026

    Walmart-backed PhonePe shelvs IPO as global tensions roil markets

    16 March 2026
  • Transportation

    K2 will launch its first high-powered computing satellite into space

    19 March 2026

    EV startup Harbinger unveils smaller work truck with electric and hybrid variants

    18 March 2026

    Rivian spin-out Mind Robotics raises $500M for AI-powered industrial robots

    17 March 2026

    Drivers in fatal Ford BlueCruise crashes were likely distracted before the crash

    17 March 2026

    Introducing the Rivian R2: See what $57,990 gets you

    15 March 2026
  • Venture

    Sequen raised $16 million to bring TikTok-style personalization technology to any consumer company

    19 March 2026

    AI ‘boys club’ could widen wealth gap for women, says Rana el Kaliouby

    18 March 2026

    Billionaires made a promise – now some want to leave

    17 March 2026

    Antonio Gracias Says He Longs For ‘Pre-Entropic’ Startups – Those Built To Survive Chaos

    17 March 2026

    Founded by a father-son duo, Nyne gives AI agents the human context they’ve been missing

    14 March 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Spyware leak offers ‘first-of-its-kind’ look at Chinese government hacking efforts
Security

Spyware leak offers ‘first-of-its-kind’ look at Chinese government hacking efforts

techtost.comBy techtost.com23 February 202405 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Spyware Leak Offers 'first Of Its Kind' Look At Chinese Government Hacking Efforts
Share
Facebook Twitter LinkedIn Pinterest Email

During the weekendsomeone posted a cache of files and documents apparently stolen by Chinese government hacking contractor I-Soon.

This leak gives cybersecurity researchers and rival governments an unprecedented opportunity to look behind the curtain of Chinese government hacking operations facilitated by private contractors.

Like hack-and-leak mode that targeted Italian spyware maker Hacking Team in 2015, the I-Soon leak includes corporate documents and internal communications that show I-Soon was allegedly involved in hacking companies and government agencies in India, Kazakhstan, Malaysia , Pakistan, Taiwan and Thailand, among others.

The leaked files were published on the code sharing site GitHub the manufacture. Since then, watchers of Chinese hacking operations have feverishly poured over the files.

“This represents the most significant data breach linked to a company suspected of providing cyberespionage and targeted intrusion services for Chinese security services,” said Jon Condra, threat intelligence analyst at cybersecurity firm Recorded Future.

For John Hultquist, the chief analyst at Google-owned Mandiant, this leak is “narrow, but deep,” he said. “Rarely do we have such unfettered access to the inner workings of any intelligence enterprise.”

Dakota Cary, an analyst at cybersecurity firm SentinelOne, he wrote in a blog publishes that “this leak provides a first-of-its-kind look into the inner workings of a state-linked hacking contractor.”

And, ESET malware researcher Matthieu Tartare said the leak “could help threat intelligence analysts link some of the compromises they’ve seen to I-Soon.”

One of the first people to go through the leak was a threat intelligence researcher from Taiwan who goes by the name Azaka. Azaka on Sunday posted a long thread at X, formerly Twitter, analyzing some of the documents and files, which don’t appear until 2022. The researcher highlighted spyware developed by I-Soon for Windows, Mac, iPhone and Android devices, as well as hardware hacking devices designed to be used in real-world situations that can crack Wi-Fi passwords, locate Wi-Fi devices, and disrupt Wi-Fi signals.

I-Soon’s ‘WiFi Near Field Attack System’, a device to hack Wi-Fi networks that comes disguised as an external battery. (Screenshot: Azaka)

“We researchers finally have a confirmation that this is how things work there and that APT teams work almost like all of us regular workers (except they get paid horribly),” Azaka told TechCrunch, “that the scale is decently large, that there is a lucrative market for hacking large government networks.” APT, or advanced persistent threats, are hacking groups that are usually supported by a government.

According to the investigators’ analysis, the documents show that I-Soon worked for China’s Ministry of Public Security, Ministry of State Security, and the Chinese army and navy. and I-Soon have also marketed and marketed their services to local law enforcement agencies across China to help target minorities such as Tibetans and Uighurs, a Muslim community living in the western Chinese region of Xinjiang.

Documents link I-Soon to APT41, a Chinese government hacker group which has reportedly been in business since 2012, targeting organizations in different healthcare, telecommunications, technology, and video gaming industries around the world.

Also, an IP address found in the I-Soon leak hosted a phishing site that digital rights organization Citizen Lab saw used against Tibetans in a 2019 hacking campaign. Citizen Lab researchers at the time named the hacking group “Poison Carp.”

Azaka, as well as others, also found logs of conversations between I-Soon employees and management, some of them extremely mundane, such as employees talking about gambling and playing the popular tile-based Chinese game mahjong.

Cary highlighted documents and conversations that show how much — or how little — I-Soon employees are paid.

Contact us

Do you know more about I-Soon or Chinese government hacks? From a non-working device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382 or via Telegram, Keybase and Wire @lorenzofb or via email. You can also contact TechCrunch via SecureDrop.

“$55,000 is being paid [US] — in 2024 dollars — to hack the Ministry of Economy of Vietnam, is not a lot of money for such a goal,” Cary told TechCrunch. “It makes me think how cheap it is for China to execute an operation against a high-value target. And what does that say about the nature of the organization’s security?’

What the leak also shows, according to Cary, is that researchers and cybersecurity firms should carefully consider the potential future actions of mercenary hacking groups based on their past activity.

“It demonstrates that a threat actor’s past targeting behavior, particularly when they are a Chinese government contractor, is not indicative of their future targets,” Cary said. “So it’s not helpful to look at this organization and say, ‘They only hacked the healthcare industry, or they hacked industry X, Y, Z and they’re hacking these countries.’ They respond to them [government] the agencies request. And these services may ask for something different. They may start work with a new office and a new location.”

The Chinese embassy in Washington did not respond to a request for comment.

An email sent to I-Soon’s support inbox went unanswered. Two anonymous employees of I-Soon he told the Associated Press that the company held a meeting on Wednesday and told staff that the leak would not affect their business and to “continue business as usual”.

At this point, there is no information on who posted the leaked documents and files and GitHub recently removed the leaked cache from its platform. But several researchers agree that the most likely explanation is a disgruntled current or former employee.

“The people who put this leak together gave her a table of contents. And the table of contents of the leak is the workers complaining about the low pay, the financial conditions of the business,” Cary said. “The leak is structured in a way that embarrasses the company.”

China Chinese cyber security efforts firstofitskind government hacker Hacking leak Leakage offers Spyware suitable
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTwo years after Russia’s invasion, Ukraine’s military startups continue
Next Article Apple’s iPhone business in India is outpacing individual EU countries, says Morgan Stanley
bhanuprakash.cg
techtost.com
  • Website

Related Posts

FBI is buying location data to track US citizens, director confirms

19 March 2026

Russians caught stealing personal data from Ukrainians with new advanced iPhone hacking tools

18 March 2026

Stryker says it is restoring systems after pro-Iranian hackers wiped out thousands of employee devices

17 March 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Anori, Alphabet’s new X spinout, faces one of the world’s most expensive bureaucratic nightmares

19 March 2026

K2 will launch its first high-powered computing satellite into space

19 March 2026

Multiverse Computing is pushing its compressed AI models into the mainstream

19 March 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

17 March 2026

Fuse raises $25M to disrupt legacy loan origination systems used by US credit unions

16 March 2026

India neobank Fi removes banking services on its platform

11 March 2026
Startups

Anori, Alphabet’s new X spinout, faces one of the world’s most expensive bureaucratic nightmares

This startup wants to make enterprise software more like a prompt

H&M wants to make clothes out of CO2 using this startup’s technology

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.