Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Seven suspects – $10 million reward: USA wants these Chinese hackers

byEray Eliaçık
March 26, 2024
in Cybersecurity
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Recent news from the United States Department of Justice (DOJ) and FBI has uncovered something alarming: a sophisticated network of cyber operations coming from China. According to the US State Department, seven Chinese hackers behind this web. Now, they’re offering a whopping $10 million reward to anyone who can help catch them.

Want to find out how it works, who it affects, what’s being done to stop it, and who these hackers are? We’ve explained everything known so far about this cybersecurity threat.

Cracking the code

The Chinese hacking web, as revealed by recent disclosures from the United States Department of Justice (DOJ) and FBI, represents a sophisticated and extensive network of cyber operations orchestrated by Chinese nationals.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

Seven suspects - $10 million reward: USA wants these Chinese hackers
(Image credit)

Here’s a detailed breakdown of its components and implications:

How it works

This cyber operation is not a one-time thing; it’s been going on for a long time, stretching over 14 years. It’s not just a few individuals working independently either; there’s evidence suggesting that the Chinese government might be involved or supporting these activities.

These hackers are sneaky. They use tricks like sending fake emails to trick people into giving away important information or downloading harmful files. Once they get in, they use advanced software to steal data or mess with computer systems. And they’re not just randomly targeting anyone – they go after specific people, like government officials, critics of China, and big business leaders.

Who gets hurt

Their reach isn’t limited to one place; they’ve targeted people all over the world. The damage they cause is serious. People’s personal information can be stolen, leading to identity theft or fraud. Businesses can lose valuable ideas and inventions, making it harder for them to compete globally. Sometimes, they even demand money from their victims to stop the attacks or to keep stolen information secret.

Why they do it

Governments and organizations are fighting back. They’re publicly naming and shaming the hackers, putting pressure on them to stop. The US State Department published names and photos of suspected attackers in a statement. The defendants are Ni Gaobin (倪高彬), 38; Weng Ming (翁明), 37; Cheng Feng (程锋), 34; Peng Yaowen (彭耀文), 38; Sun Xiaohui (孙小辉), 38; Xiong Wang (熊旺), 35; and Zhao Guangzong (赵光宗), 38. All are believed to reside in the PRC.

Seven suspects - $10 million reward: USA wants these Chinese hackers
(Image credit)

The seven individuals reportedly dispatched more than 10,000 “malicious emails, affecting thousands of victims worldwide,” according to the Justice Department, labeling it a “highly active global hacking campaign” supported by the Chinese government. The US State Department unveiled a bounty of up to $10 million (£8 million) for any leads on the whereabouts or identities of the seven individuals.

People are also stepping up their online security, using better passwords, and being careful about what they click on.

What’s being done

In response to these cyber threats, governments and organizations are implementing countermeasures such as:

  • Public indictments: The public disclosure of indictments aims to identify and hold accountable those responsible for cyber attacks.
  • Enhanced cybersecurity measures: Governments and businesses are bolstering their cybersecurity defenses, including implementing stronger authentication mechanisms, regularly updating software, and conducting comprehensive security assessments.

Future

The Chinese hacking web represents a sophisticated and pervasive cyber threat with far-reaching implications for individuals, businesses, and governments worldwide. Understanding its structure, tactics, and motives is crucial for developing effective countermeasures and safeguarding against future attacks.

Collaboration between nations, organizations, and cybersecurity experts is essential in combating this evolving threat landscape and ensuring a secure digital environment for all.


Featured image credit: Eray Eliaçık/Bing

Tags: hackUSA

Related Posts

Tor replaces legacy encryption to block traffic tagging attacks

Tor replaces legacy encryption to block traffic tagging attacks

December 1, 2025
Why this country bans Android for senior officers over malware fears

Why this country bans Android for senior officers over malware fears

December 1, 2025
AWS introduces DNS failover feature to prevent future outages

AWS introduces DNS failover feature to prevent future outages

November 28, 2025
Asus issues critical warning RCE flaw hits AiCloud routers

Asus issues critical warning RCE flaw hits AiCloud routers

November 28, 2025
BankBot YNRK is stealing crypto and bank data in total silence

BankBot YNRK is stealing crypto and bank data in total silence

November 28, 2025
ShadowV2 botnet exploited AWS outage timeline to test global IoT attacks

ShadowV2 botnet exploited AWS outage timeline to test global IoT attacks

November 27, 2025

LATEST NEWS

ChatGPT might show ads according to a code string

Tor replaces legacy encryption to block traffic tagging attacks

Google might change how Gemini looks and feels

You might pay for a PlayStation game with a stablecoin soon

Why this country bans Android for senior officers over malware fears

ChatGPT turns three today

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.