A brand new information leak that seems to have come from one among China’s prime non-public cybersecurity companies offers a uncommon glimpse into the business aspect of China’s many state-sponsored hacking teams. Consultants say the leak illustrates how Chinese language authorities companies more and more are contracting out international espionage campaigns to the nation’s burgeoning and extremely aggressive cybersecurity trade.

A advertising and marketing slide deck selling i-SOON’s Superior Persistent Menace (APT) capabilities.
A big cache of greater than 500 paperwork published to GitHub final week point out the data come from i-SOON, a know-how firm headquartered in Shanghai that’s maybe greatest recognized for offering cybersecurity coaching programs all through China. However the leaked paperwork, which embody candid worker chat conversations and pictures, present a much less public aspect of i-SOON, one which continuously initiates and sustains cyberespionage campaigns commissioned by numerous Chinese language authorities companies.
The leaked paperwork counsel i-SOON workers have been answerable for a raft of cyber intrusions over a few years, infiltrating authorities programs in the UK and international locations all through Asia. Though the cache doesn’t embody uncooked information stolen from cyber espionage targets, it options quite a few paperwork itemizing the extent of entry gained and the varieties of information uncovered in every intrusion.
Safety consultants who reviewed the leaked information say they consider the knowledge is legit, and that i-SOON works carefully with China’s Ministry of Public Safety and the navy. In 2021, the Sichuan provincial authorities named i-SOON as one among “the highest 30 data safety firms.”
“The leak offers a number of the most concrete particulars seen publicly thus far, revealing the maturing nature of China’s cyber espionage ecosystem,” said Dakota Cary, a China-focused advisor on the safety agency SentinelOne. “It exhibits explicitly how authorities focusing on necessities drive a aggressive market of unbiased contractor hackers-for-hire.”
Mei Danowski is a former intelligence analyst and China knowledgeable who now writes about her analysis in a Substack publication known as Natto Ideas. Danowski stated i-SOON has achieved the very best secrecy classification {that a} non-state-owned firm can obtain, which qualifies the corporate to conduct labeled analysis and improvement associated to state safety.
i-SOON’s “enterprise providers” webpage states that the corporate’s choices embody public safety, anti-fraud, blockchain forensics, enterprise safety options, and coaching. Danowski stated that in 2013, i-SOON established a division for analysis on growing new APT community penetration strategies.
APT stands for Superior Persistent Menace, a time period that typically refers to state-sponsored hacking teams. Certainly, among the many paperwork apparently leaked from i-SOON is a gross sales pitch slide boldly highlighting the hacking prowess of the corporate’s “APT analysis group” (see screenshot above).

i-SOON CEO Wu Haibo, in 2011. Picture: nattothoughts.substack.com.
The leaked paperwork included a prolonged chat dialog between the corporate’s founders, who repeatedly focus on flagging gross sales and the necessity to safe extra workers and authorities contracts. Danowski stated the CEO of i-SOON, Wu Haibo (“Shutdown” within the leaked chats) is a widely known first-generation purple hacker or “Honker,” and an early member of Inexperienced Military — the very first Chinese language hacktivist group based in 1997. Mr. Haibo has not but responded to a request for remark.
In October 2023, Danowski detailed how i-SOON turned embroiled in a software program improvement contract dispute when it was sued by a competing Chinese language cybersecurity firm known as Chengdu 404. In September 2021, the U.S. Division of Justice unsealed indictments against multiple Chengdu 404 employees, charging that the corporate was a facade that hid greater than a decade’s value of cyber intrusions attributed to a risk actor group generally known as “APT 41.”
Danowski stated the existence of this authorized dispute means that Chengdu 404 and i-SOON have or at one time had a enterprise relationship, and that one firm possible served as a subcontractor to the opposite.
“From what they chat about we will see it is a very aggressive trade, the place firms on this house are consistently poaching every others’ workers and instruments,” Danowski stated. “The infosec trade is all the time making an attempt to differentiate [the work] of 1 APT group from one other. However that’s getting tougher to do.”
It stays unclear if i-SOON’s work has earned it a singular APT designation. However Will Thomas, a cyber risk intelligence researcher at Equinix, discovered an Web tackle within the leaked information that corresponds to a website flagged in a 2019 Citizen Lab report about one-click cell phone exploits that have been getting used to focus on teams in Tibet. The 2019 report referred to the risk actor behind these assaults as an APT group known as Poison Carp.
A number of pictures and chat data within the information leak counsel i-SOON’s purchasers periodically gave the corporate an inventory of targets they wished to infiltrate, however typically workers confused the directions. One screenshot exhibits a dialog by which an worker tells his boss they’ve simply hacked one of many universities on their newest checklist, solely to be advised that the sufferer in query was not really listed as a desired goal.
The leaked chats present i-SOON repeatedly tried to recruit new expertise by internet hosting a sequence of hacking competitions throughout China. It additionally carried out charity work, and sought to have interaction workers and maintain morale with numerous team-building occasions.
Nevertheless, the chats embody a number of conversations between workers commiserating over lengthy hours and low pay. The general tone of the discussions signifies worker morale was fairly low and that the office setting was pretty poisonous. In a number of of the conversations, i-SOON workers brazenly focus on with their bosses how a lot cash they only misplaced playing on-line with their cell phones whereas at work.
Danowski believes the i-SOON information was most likely leaked by a kind of disgruntled workers.
“This was launched the primary working day after the Chinese language New 12 months,” Danowski stated. “Positively whoever did this deliberate it, as a result of you may’t get all this data suddenly.”
SentinelOne’s Cary stated he got here to the identical conclusion, noting that the Protonmail account tied to the GitHub profile that printed the data was registered a month earlier than the leak, on January 15, 2024.
China’s a lot vaunted Great Firewall not solely lets the federal government management and restrict what residents can entry on-line, however this distributed spying equipment permits authorities to dam information on Chinese language residents and corporations from ever leaving the nation.
Consequently, China enjoys a outstanding data asymmetry vis-a-vis just about all different industrialized nations. Which is why this obvious information leak from i-SOON is such a uncommon discover for Western safety researchers.
“I used to be so excited to see this,” Cary stated. “Each day I hope for information leaks popping out of China.”
That data asymmetry is on the coronary heart of the Chinese language authorities’s cyberwarfare targets, in response to a 2023 analysis by Margin Analysis carried out on behalf of the Protection Superior Analysis Tasks Company (DARPA).
“Within the space of cyberwarfare, the western governments see our on-line world as a ‘fifth area’ of warfare,” the Margin research noticed. “The Chinese language, nonetheless, have a look at our on-line world within the broader context of knowledge house. The last word goal is, not ‘management’ of our on-line world, however management of knowledge, a imaginative and prescient that dominates China’s cyber operations.”
The Nationwide Cybersecurity Technique issued by the White House last year singles out China as the most important cyber risk to U.S. pursuits. Whereas the US authorities does contract sure features of its cyber operations to firms within the non-public sector, it doesn’t comply with China’s instance in selling the wholesale theft of state and company secrets and techniques for the business good thing about its personal non-public industries.
Dave Aitel, a co-author of the Margin Analysis report and former pc scientist on the U.S. Nationwide Safety Company, stated it’s good to see that Chinese language cybersecurity companies must take care of the entire identical contracting complications dealing with U.S. firms searching for work with the federal authorities.
“This leak simply exhibits there’s layers of contractors all the way in which down,” Aitel stated. “It’s fairly enjoyable to see the Chinese language model of it.”