Hainan State Security Department: Difference between revisions
CycloneYoris (talk | contribs) Requesting speedy deletion (CSD G12). |
Disclaimer of public domain source added |
||
Line 69: | Line 69: | ||
== References == |
== References == |
||
{{Reflist}}{{US government sources|sourceURL=https://www.justice.gov/opa/pr/four-chinese-nationals-working-ministry-state-security-charged-global-computer-intrusion|author=}}{{MSS|state=expanded}} |
|||
{{Reflist}}{{MSS|state=expanded}} |
|||
[[Category:Provincial organs of the Ministry of State Security (China)]] |
[[Category:Provincial organs of the Ministry of State Security (China)]] |
||
[[Category:Cyberespionage units of the Ministry of State Security (China)]] |
[[Category:Cyberespionage units of the Ministry of State Security (China)]] |
Revision as of 01:15, 29 April 2024
This article may meet Wikipedia's criteria for speedy deletion as a copyright infringement(Copyvios report) of https://www.justice.gov/opa/pr/four-chinese-nationals-working-ministry-state-security-charged-global-computer-intrusion (Copyvios report). This criterion applies only in unequivocal cases, where there is no free-content material on the page worth saving and no later edits requiring attribution – for more complicated situations, see Wikipedia:Copyright violations. See CSD G12.
If this article does not meet the criteria for speedy deletion, or you intend to fix it, please remove this notice, but do not remove this notice from pages that you have created yourself. If you created this page and you disagree with the given reason for deletion, you can click the button below and leave a message explaining why you believe it should not be deleted. You can also visit the talk page to check if you have received a response to your message. Note that this article may be deleted at any time if it unquestionably meets the speedy deletion criteria, or if an explanation posted to the talk page is found to be insufficient. Note to administrators: this article has content on its talk page which should be checked before deletion. Note to administrators: If declining the request due to not meeting the criteria please consider whether there are still copyright problems with the page and if so, see these instructions for cleanup, or list it at Wikipedia:Copyright problems. Please be sure that the source of the alleged copyright violation is not itself a Wikipedia mirror. Also, ensure the submitter of this page has been notified about our copyright policy.Administrators: check links, talk, history (last), and logs before deletion. Consider checking Google. This page was last edited by Abovfold (contribs | logs) at 01:15, 29 April 2024 (UTC) (22 days ago) |
Chinese: 海南省国家安全厅 | |
Department overview | |
---|---|
Formed | April 1984 |
Preceding department |
|
Jurisdiction | Hainan province |
Headquarters | No. 176 Nanhai Avenue, Xiuying District, Haikou, Hainan, China 19°59′48″N 110°16′53″E / 19.99667°N 110.28133°E |
Employees | Classified |
Annual budget | Classified |
Department executive |
|
Parent ministry | Ministry of State Security |
The Hainan State Security Department (HSSD; Chinese: 海南省国家安全厅) is a provincial department of the Chinese Ministry of State Security responsible for national security and secret policing in the contiguous island province of Hainan, headquartered in Haikou. Members of the Hainan SSD have badge numbers with prefixes beginning with "46xxxx".[1] The HSSD is best known for operating the advanced persistent threat (APT) number 40.
Advanced persistent threat actor
The Hainan State Security Department is behind the advanced persistent threat known as APT40.[2][3][4]
In May 2021, a US federal grand jury in San Diego, California, returned an indictment against four hackers of the Hainan SSD for hacking attributed to the Hainan Xiandun Technology Development Co., Ltd. (海南仙盾) (Hainan Xiandun), a since disbanded front company, to operate out of Haikou, Hainan Province.[2][5][6]
The two-count indictment alleged that Ding Xiaoyang (丁晓阳), Cheng Qingmin (程庆民) and Zhu Yunmin (朱允敏), were HSSD officers responsible for coordinating, facilitating and managing computer hackers and linguists at Hainan Xiandun and other MSS front companies to conduct hacking for the benefit of China and its state-owned and sponsored instrumentalities. The indictment alleges that Wu Shurong (吴淑荣) was a computer hacker who, as part of his job duties at Hainan Xiandun, created malware, hacked into computer systems operated by foreign governments, companies and universities, and supervised other Hainan Xiandun hackers.[2][3]
Targets
APT40's campaigns have targeted a range of victims originating in the United States, Austria, Cambodia, Canada, Germany, Indonesia, Malaysia, Norway, Saudi Arabia, South Africa, Switzerland and the United Kingdom.[2] Targeted industries included, among others, aviation, defense, education, government, healthcare, biopharmaceuticals and maritime.[2][3]
Stolen trade secrets and confidential business information included, among other things, sensitive technologies used for submersibles and autonomous vehicles, specialty chemical formulas, commercial aircraft servicing, proprietary genetic-sequencing technology and data, and foreign information to support China’s efforts to secure contracts for state-owned enterprises within the targeted country (e.g., large-scale high-speed railway development projects).[2]
In the most concerning instances, hackers from the Hainan SSD targeted research on highly pathogenic biological agents including Ebola, MERS, HIV/AIDS, Marburg and tularemia, several of which have been historically weaponized as biological warfare agents.[2][3][7]
The indictment charged the Hainan MSS officers with coordinating intelligence requirements with academics at universities in Hainan and elsewhere in China. Not only did such universities assist the MSS in identifying and recruiting hackers and linguists to penetrate and steal from the computer networks of targeted entities, including peers at many foreign universities, but personnel at one identified Hainan-based university also helped support and manage Hainan Xiandun as a front company, including through payroll, benefits and a mailing address.[2]
List of directors
Name | Entered office | Left office | Time in office | ref. |
---|---|---|---|---|
Xiong Fangming (熊方明) | February 29, 2008 | 2013 | 5 years | [8] |
Unknownf1 | 2013 | March 31, 2015 | 2 years | |
Chen Haijun (陈海军) | March 31, 2015 | Unknown | Unknown | [9] |
References
- ^ "APT40 is run by the Hainan department of the Chinese Ministry of State Security". Intrusion Truth. 2020-01-16. Retrieved 2023-12-06.
- ^ a b c d e f g h "Four Chinese Nationals Working with the Ministry of State Security Charged with Global Computer Intrusion Campaign Targeting Intellectual Property and Confidential Business Information, Including Infectious Disease Research". United States Department of Justice. 2021-07-19. Retrieved 2023-08-07.
- ^ a b c d Mozur, Paul; Buckley, Chris (2021-08-26). "Spies for Hire: China's New Breed of Hackers Blends Espionage and Entrepreneurship (Published 2021)". The New York Times. Retrieved 2023-08-07.
- ^ Khoury, Syrine (2021-07-19). "Statement on China's cyber campaigns". Global Affairs Canada. Retrieved 2023-12-06.
APT 40 almost certainly consists of elements of the Hainan State Security Department's regional MSS office. This group's cyber activities targeted critical research in Canada's defence, ocean technologies and biopharmaceutical sectors in separate malicious cyber campaigns in 2017 and 2018.
- ^ "Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China's MSS Hainan State Security Department | CISA". Cybersecurity and Infrastructure Security Agency. 2021-07-20. Retrieved 2023-08-07.
- ^ "UK and allies hold Chinese state responsible for a pervasive pattern of hacking". Foreign, Commonwealth & Development Office. 19 July 2021. Retrieved 2023-08-07.
- ^ Cimpanu, Catalin (July 18, 2021). "US indicts four members of Chinese hacking group APT40". The Record. Retrieved 2023-08-07.
- ^ "海南省國家安全廳 - 怪猫的图书资源库" [Hainan Provincial Department of State Security]. Fudan University (in Chinese). Retrieved 2023-08-10.
- ^ "Chen Haijun". 百度百科. Retrieved 2023-12-06.
This article incorporates text from this source, which is in the public domain: https://www.justice.gov/opa/pr/four-chinese-nationals-working-ministry-state-security-charged-global-computer-intrusion