2024-02-20 10:55:00
The picture shows members of a Chinese hacker group using computers in their office in Dongguan on August 4, 2020. Not relevant to this article. (Nicolas Asfouri/AFP)
[The Epoch Times, February 20, 2024](Epoch Times reporter Lin Yan reported) A large number of internal documents of Anxun, a Chinese cybersecurity company that works for the Ministry of Public Security of the Communist Party of China, were leaked, and exposed a series of its overseas attack targets and offensive capabilities. Tools and operations.
This gave the outside world a glimpse into the inner workings of Chinese hackers, and was regarded by the cybersecurity community as a landmark exposure.
The documents were posted anonymously on the software development platform GitHub and were discovered on Sunday (February 18) by Taiwanese security researcher AzakaSekai_ (@AzakaSekai_) and shared on the social media X platform.
Leaked documents show that An Xun boasted in presentations and other documents that they had hacked or attacked the Indian Ministry of Defense, NATO and the British National Crime Agency, and had conducted long-term in-depth visits to telecommunications companies in neighboring countries.
The leaked files also contain malware targeting various platforms including Microsoft Exchange and Android, as well as social media Twitter public opinion guidance systems and customized hardware for network penetration.
An Xun provides hacking tools and services to the Chinese government, and his behavior is similar to APT rental services.
According to a post published by a group of geopolitical and security researchers called “NATTO” in 2023, Anxun was founded by patriotic hacker Wu Haibo (English name Jesse Chen, online name shutdown).
Hoshikai Ansaka said that the leaked documents disclosed details of the Chinese Communist Party’s state-sponsored hacker network activities. For example, some offensive software has specific functions that can “obtain users’ Twitter email and phone numbers, monitor them in real time, post tweets on behalf of users, and read private messages.”
A large number of internal documents of Anxun, a Chinese network security company working for the Ministry of Public Security of the Communist Party of China, were leaked. The picture shows the product introduction document of the Twitter public opinion guidance and control system produced by Anxun. (Photo taken by The Epoch Times via GitHub)
An Xun claimed in the document that they can target Android and iOS devices and obtain a large amount of sensitive information, such as hardware information, GPS data, contacts, media files and real-time recordings.
The documents also show the various tools An Xun used to steal victims’ information, including WiFi devices capable of planting malware through WiFi signals. Visually, the device looks similar to portable power banks from well-known Chinese manufacturers.
An Xun also used different types of gadgets that might be used to monitor personal information using Chinese social media platforms such as Weibo, Baidu and WeChat.
The documents also reveal sensitive details of their hacking into multiple foreign telecommunications providers, such as Kazakhstan’s Beeline and Tele2 providers. The leaked document also contains a list of attacked objects that they used excel to calculate.
In addition, the documents also leaked the salaries of Anxun’s internal employees. It seems that employees are dissatisfied with their salary and the company, which triggered the leak of this information.
According to information from the mainland inquiry website “Qichacha”, Anxun Information Technology Co., Ltd. was established in 2010 and is headquartered in Shanghai. The CEO is Wu Haibo.
The record of Qichacha is that Anxun provides technical solutions to national special industries, provides customers with complete independent intellectual property solutions, provides leading security consulting, support and maintenance and other information technology operation solutions, and also provides military and civilian software customization. Manufacturing research and development, Internet security portal services (05112.com Fengyun Network), information security big data platform, cloud architecture security simulation equipment development and sales, mobile communication security research and technology application product development and sales.
The team introduction on Anxun’s company website states that Anxun’s information technology team started in 2013 and focuses on APT network attack and defense, cyberspace security strategy, black and gray product countermeasures and other fields. Team members have extensive experience in APT attack and defense confrontation, WEB It has strong strength in penetration and other fields, has accumulated rich experience, and can respond quickly to customer needs.
As of the deadline for this article, An Xun did not immediately respond to The Epoch Times for comment.
Editor in charge: Ye Ziwei#
1708461922
#Anxun #company #information #leaked #reveals #CCP #attacks #West #APT #CCP #hackers