Chinese Government Hackers Suspected of Moonlighting for Profit

According to officials, Chinese hacking groups were known to pursue commercial crimes alongside their state-backed operations.

Advertisement
By Reuters | Updated: 8 August 2019 12:16 IST
Highlights
  • The group called APT41 is found to use espionage campaign tools
  • The findings were announced at the Black Hat security conference
  • Some of the hacking tools were used previously used by APT17 group

US firm FireEye has said the hackers group penetrated and spied on global companies

One of the most effective teams of Chinese government-backed hackers is also conducting financially-motivated side operations, cybersecurity researchers said on Wednesday.

US firm FireEye said members of the group it called Advanced Persistent Threat 41 (APT41) penetrated and spied on global tech, communications and healthcare providers for the Chinese government while using ransomware against game companies and attacking cryptocurrency providers for personal profit.

The findings, announced at the Black Hat security conference in Las Vegas, show how some of the world's most advanced hackers increasingly pose a threat to consumers and companies not traditionally targeted by state-backed espionage campaigns.

Advertisement

“APT41 is unique among the China-Nexus actors we track in that it uses tools typically reserved for espionage campaigns in what appears to be activity for personal gain," said FireEye Senior Vice President Sandra Joyce.

Advertisement

Officials in China did not immediately respond to Reuters request for comment. Beijing has repeatedly denied Western accusations of conducting widespread cyber espionage.

FireEye said the APT 41 group used some of the same tools as another group it has previously reported on, which FireEye calls APT17 and Russian security firm Kaspersky calls Winnti.

Advertisement

Current and former Western intelligence officials told Reuters Chinese hacking groups were known to pursue commercial crimes alongside their state-backed operations.

FireEye, which sells cybersecurity software and services, said one member of APT41 advertised as a hacker for hire in 2009 and listed hours of availability outside of the normal workday, circumstantial evidence of moonlighting.

Advertisement

The group has used spear-phishing, or trick emails designed to elicit login information. But it has also deployed root kits, which are relatively rare and give hard-to-detect control over computers. In all, the group has used nearly 150 unique pieces of malware, FireEye said.

The most technically impressive feats included tainting millions of copies of a utility called CCleaner, now owned by security company Avast. Only a small number of specially selected, high-value computers were fully compromised, making detection of the hack more difficult.

Avast said at the it had worked with security researchers and law enforcement to stop the attack and that no damage was detected. The company did not have any immediate further comment on Wednesday.

In March, Kaspersky found the group hijacked Asus' software update process to reach more than 1 million computers, again targeting a much smaller number of end users. Asus said the next day it had issued a fix for the attack, which affected "a small number of devices."

"We have evidence that at least one telecom company may have been the intended target during the Asus compromise, which is consistent with APT41's espionage targeting over the past two years," said FireEye spokesman Dan Wire.

But FireEye and Slovakia-based cybersecurity company ESET said the gaming compromises aligned with financial motives more than national espionage. Among other things, the group won access to a game's production environment and generated tens of millions of dollars' worth of virtual currency, FireEye said.

© Thomson Reuters 2019

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. iQOO Neo 11 With Snapdragon 8 Elite SoC Launched: Price, Specifications
  2. Top OTT Releases of the Week: Kantara Chapter 1, Lokah Chapter 1, Idli Kadai, and More
  3. Realme GT 8 Pro Will Launch in India in November With This Chipset
  4. Vivo X300 Series Launching Today: Everything You Need to Know
  5. Reliance Offers Free 18-Month Google AI Pro with Gemini, Veo to Jio Users
  6. How to Claim 18 Months of Free Google AI Pro Access on the MyJio App
  7. Samsung Galaxy S26 Series Teased to Launch With These Notable Upgrades
  1. Bitchat Becomes Jamaica’s Go-to App as Hurricane Melissa Cripples Communication
  2. Take-Two CEO Says AI Won't Be 'Very Good' at Making a Game Like Grand Theft Auto
  3. Reliance Users to Get Free Google AI Pro Access for 18 Months Worth Rs. 35,100 With Gemini, Veo Features
  4. Meta’s VR Headsets and AI Glasses Cost the Company $4.4 Billion in Q3 2025
  5. iQOO Neo 11 With 7,500mAh Battery, Snapdragon 8 Elite Chip Launched: Price, Specifications
  6. Telegram Founder Pavel Durov Launches Cocoon, a Decentralised AI Project on TON
  7. Hedda (2025) Now Available for Streaming on Amazon Prime Video: What You Need to Know
  8. Samsung Galaxy S26 Series Teased to Launch With Upgraded Chipset, Camera, and AI Features
  9. Snapdragon 8 Gen 5 Chipset Key Specifications and Benchmark Scores Tipped; May Power Upcoming iQOO, Vivo Phones
  10. Realme GT 8 Pro Confirmed to Launch in India in November; Will Go on Sale via Flipkart
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.