Leaked Documents Expose Chinese Technology Company's Extensive Hacking Operations
ICARO Media Group
A recent leak of over 500 sensitive technical documents has shed light on the clandestine activities of a Chinese technology company known as i-Soon. The leaked documents, which were anonymously posted online on the open-source development platform GitHub, detail the company's hacking operations, target lists, and marketing materials tailored for the Chinese government's surveillance purposes.
The majority of the operations outlined in the leak appear to be aimed at surveilling and harassing dissidents critical of the Chinese government. Target lists include victims from at least 14 governments worldwide, as well as academic institutions, pro-democracy organizations in Hong Kong, and even the military alliance NATO. Shockingly, the company was reportedly vying for a contract to surveil the Uyghur population in Xinxiang, a highly controversial initiative criticized by global human rights organizations.
Cybersecurity experts, including trusted firms like Google's Mandiant and Sentinel Labs, have conducted preliminary analyses of the leak and believe the documents to be authentic. John Hultquist, chief analyst for Mandiant Intelligence, expressed the significance of the leak, stating that it provides unprecedented access to the inner workings of a global cyber espionage operation.
The leaked documents suggest that i-Soon is among the many contractors competing to conduct hacking and surveillance operations for various Chinese government agencies. The company has established ties with key entities such as China's Ministry of Public Security, Ministry of State Security, and the People's Liberation Army. Despite i-Soon's public reputation for providing cybersecurity training in China, the leak reveals a deeper look into the competitive landscape of hacking operations within the country.
While the authenticity of all claims made in the leaked marketing materials remains unverified, the documents indicate the company's focus on automating surveillance on platforms like X (formerly Twitter) and Facebook, which are popular among dissidents due to their lack of government control. Internal details in the leak also shed light on pay scales and bureaucratic aspects of i-Soon's contracts with the Chinese government.
The leak, which includes a "ReadMe" document suggesting a source dissatisfied with the company's policies, has prompted intense scrutiny from specialists and researchers. The revelations within the leaked documents are expected to aid researchers in verifying previous breach attributions and gaining insights into the operations of entities involved in cyber espionage.