Cybersecurity and Hacking Groups in China

In the age of digital transformation, the issue of cybersecurity has become a critical concern for both governments and private organizations worldwide. China, as a global power with one of the largest internet populations, has developed a complex cybersecurity landscape. The country’s rapid economic growth, technological advancements, and political influence have placed it at the center of international discussions on cybersecurity, hacking groups, and cyber espionage.

China’s cybersecurity ecosystem is multifaceted, with significant investments made both by the state and private sector. While the Chinese government has prioritized cyber defense, the country is also home to various hacking groups—both state-sponsored and independent—that play a key role in the global cyber ecosystem. These groups engage in a wide range of activities, including cyber espionage, intellectual property theft, and even disruptive cyberattacks targeting foreign governments, corporations, and critical infrastructure.

Cybersecurity and Hacking Groups in China


The Evolution of China’s Cybersecurity Landscape

Early Developments and Cyber Defense

China’s engagement with cybersecurity can be traced back to the early years of the internet era. During the 1990s and early 2000s, as the internet began to proliferate, China faced a growing challenge in securing its digital infrastructure. In response, the government initially focused on cyber defense as part of its broader national security strategy, recognizing the potential for cyberspace to be exploited for both economic and military purposes.

The Chinese government began to establish the framework for cybersecurity governance in the late 1990s. However, it was not until the 2000s that China started to develop a more formalized and structured approach to cyber defense, creating agencies such as the Ministry of Public Security (MPS) and the State Internet Information Office (SIIO). These institutions played critical roles in the regulation, monitoring, and protection of China’s cyberspace. By the mid-2000s, the government also began to tighten its control over internet content, implementing laws to regulate online speech, curb dissent, and safeguard national interests.

The Rise of State-Sponsored Cyber Operations

The real shift in China’s approach to cybersecurity came with the realization that cyberspace was not only an arena for defense but also an opportunity to advance national interests, particularly in the realms of espionage, political influence, and military strategy. By the mid-2010s, the Chinese government had established more advanced cyber operations capabilities, with a focus on economic espionage and securing critical infrastructure.

The concept of “cyber sovereignty” emerged as a key theme in Chinese cybersecurity policy, which emphasizes that each country should have control over its own cyberspace. This idea has influenced China’s internal policies, such as the 2017 Cybersecurity Law, which mandates that companies operating in China store data domestically and comply with government surveillance requirements. In parallel, China has become a major proponent of international cybersecurity norms that align with its interests, often advocating for the idea that governments should have more authority over internet governance.

China’s cyber capabilities were further enhanced in 2014 with the creation of the Strategic Support Force (SSF), which consolidates China’s military cyber units under a single command. The SSF is responsible for overseeing both offensive and defensive cyber operations, including cyber espionage, hacking, and information warfare.


Chinese Hacking Groups: An Overview

Categories of Hacking Groups in China

Chinese hacking groups can generally be classified into three categories based on their affiliation and activities: state-sponsored groups, criminal syndicates, and independent hacktivists. Each of these categories operates under different motivations and objectives, although there is considerable overlap in terms of methods and targets.

State-Sponsored Hacking Groups

State-sponsored hacking groups in China are typically affiliated with the People’s Liberation Army (PLA), the Ministry of State Security (MSS), or other government agencies. These groups are tasked with cyber espionage and intelligence-gathering operations, often targeting foreign governments, corporations, and research institutions to gain access to sensitive information and technological secrets.

Among the most notable of these groups is APT1, also known as the Comment Crew, which is believed to operate under the Chinese military’s Unit 61398. This group gained international attention for its sophisticated cyber espionage operations, which focused on stealing intellectual property from Western corporations in sectors such as aerospace, energy, and telecommunications.

Another prominent group is APT10, also known as Stone Panda or MenuPass. This group has been attributed to cyberattacks on critical infrastructure and is believed to be aligned with Chinese intelligence agencies. APT10 has targeted organizations in industries such as healthcare, technology, and defense, stealing sensitive data that could give China a technological advantage.

Criminal Hacking Groups

In addition to state-sponsored actors, China is also home to several criminal hacking syndicates. These groups primarily engage in financially motivated activities, such as stealing personal data, financial fraud, and selling hacking tools or stolen data on the black market. While these groups are not directly affiliated with the Chinese government, their activities often overlap with state interests, and some have been accused of facilitating espionage or hacking campaigns that support China’s broader strategic goals.

One well-known example of such a group is the “Winnti” group, which has been linked to a series of cyberattacks targeting the gaming industry. The group has also been accused of distributing ransomware and malware to infiltrate corporate networks for the purpose of stealing intellectual property and trade secrets.

Criminal hackers in China also engage in the widespread theft of personal and financial data, which is then used for identity theft, credit card fraud, or other illegal activities. These groups often work in coordination with other criminal enterprises, both within China and internationally.

Independent and Hacktivist Groups

Independent hackers and hacktivist groups in China also contribute to the country’s cybersecurity landscape. These groups are typically motivated by political, ideological, or social causes and use hacking as a tool for activism. Hacktivism in China has traditionally been less visible compared to other parts of the world, due to strict government censorship and control over the internet.

However, in recent years, there has been a growing wave of political dissent online, and some Chinese hackers have taken to the internet to protest government policies, human rights abuses, and international issues. These hacktivists may target government websites, corporate entities, or foreign organizations to express their grievances.

An example of a Chinese hacktivist group is the “Chinese Army of Cyber Warriors” (CACW), which has carried out politically motivated cyberattacks, typically aimed at foreign governments or companies perceived to be in conflict with Chinese interests.


Techniques and Tools Used by Chinese Hackers

Advanced Persistent Threats (APTs)

One of the defining characteristics of Chinese state-sponsored hacking groups is their use of Advanced Persistent Threats (APTs). APTs are a class of cyberattacks that are typically characterized by prolonged, stealthy efforts to infiltrate a target’s systems and gather sensitive information over an extended period. Chinese APT groups employ a variety of methods to gain access to their targets, including spear-phishing, social engineering, and exploiting zero-day vulnerabilities in software.

Chinese APT groups are known for their high level of technical sophistication and their ability to maintain long-term access to compromised systems. Once inside a target’s network, these groups are adept at exfiltrating large volumes of data while remaining undetected.

Malware and Exploits

Chinese hackers are also skilled at creating and deploying custom malware tailored to specific targets. These malware programs are often designed to bypass traditional security measures, such as firewalls and antivirus software, by exploiting vulnerabilities in the target’s systems.

Some well-known pieces of malware associated with Chinese hacking groups include “GhostNet,” which was used in a cyber espionage campaign targeting government agencies, and “Tonto Team,” which has been linked to cyberattacks on telecommunications and aerospace companies.

Exploit frameworks like “EternalBlue” and “DoublePulsar” have also been used in Chinese cyber operations. These tools, which were originally developed by the United States’ National Security Agency (NSA), were leaked by a hacking group known as Shadow Brokers in 2017. Chinese hacking groups have leveraged these tools in their operations, launching ransomware attacks and infiltrating networks to steal data.

Cyber-espionage Tools and Techniques

China’s cyber-espionage operations are some of the most sophisticated in the world. Hacking groups affiliated with Chinese intelligence agencies have developed a range of specialized tools and techniques to collect valuable information from foreign governments, corporations, and academic institutions.

These groups typically focus on stealing intellectual property, trade secrets, military technologies, and other sensitive data. They employ various tactics, such as monitoring email communications, infiltrating supply chains, and using malware to access sensitive files. Cyber-espionage operations are often designed to operate under the radar, gathering data without triggering alarms from the target organization.

China has also been accused of using “supply chain attacks,” in which hackers infiltrate trusted vendors or service providers to gain access to a broader range of targets. This tactic was seen in the massive 2020 SolarWinds hack, which was attributed to Russian hackers but has also raised concerns about the vulnerability of global supply chains to state-sponsored cyberattacks.


China’s National Cybersecurity Strategy

Cybersecurity Law and Regulation

In recent years, China has implemented a series of laws and regulations aimed at strengthening cybersecurity and controlling the flow of information. The most significant of these is the 2017 Cybersecurity Law, which mandates that companies store data domestically and cooperate with government surveillance requests. This law has drawn significant criticism from international observers, who argue that it infringes on privacy rights and freedom of speech.

The law also requires companies to implement strong cybersecurity measures, conduct regular security assessments, and report data breaches to the government. While this law is aimed at bolstering China’s internal cybersecurity defenses, it has raised concerns about the potential for state surveillance and control over the internet.

The Role of the Chinese Military in Cyber Operations

China’s military, specifically the People’s Liberation Army (PLA), has played an increasingly prominent role in the country’s cyber operations. The PLA’s Strategic Support Force (SSF) is responsible for conducting cyberattacks, information warfare, and electronic warfare operations. This unit coordinates China’s efforts to use cyberspace as a domain for military advantage.

The SSF’s activities include cyber espionage, hacking operations aimed at foreign governments, and influencing international narratives through the manipulation of information. The PLA’s growing cyber capabilities are seen as a key element of China’s broader military modernization efforts, which are focused on creating a more sophisticated and technologically advanced military force.

International Cyber Diplomacy

China’s approach to cybersecurity also extends beyond its borders. The country has been actively involved in shaping international norms around cyber governance and cybersecurity. At the United Nations, China has proposed various initiatives to promote global cooperation on cybersecurity, often advocating for the principle of “cyber sovereignty” and stressing the need for states to have control over their own cyberspace.

However, China’s position on cybersecurity is often seen as self-serving, as it seeks to expand its influence over the global internet while limiting external criticism of its domestic policies. The country’s heavy surveillance and censorship measures, combined with its aggressive cyber espionage activities, have led to growing tensions with other countries, particularly the United States and its allies.


Global Impact of Chinese Cyber Operations

Cyber Espionage and Global Security

China’s cyber operations have far-reaching implications for global cybersecurity and international relations. The country’s efforts to engage in cyber espionage have targeted a wide range of industries, including defense, technology, finance, and healthcare. As China continues to develop its cyber capabilities, it has raised concerns among governments and corporations about the risks of intellectual property theft, data breaches, and disruption of critical infrastructure.

The theft of trade secrets, particularly in high-tech sectors, has been a significant concern for Western nations. China’s ability to access sensitive data, ranging from government secrets to proprietary corporate information, has given it a strategic advantage in industries such as telecommunications, manufacturing, and defense.

Cybersecurity in the Context of U.S.-China Rivalry

The growing cyber rivalry between the United States and China is a reflection of the broader geopolitical tensions between the two superpowers. Cyberattacks and espionage have become a critical component of the U.S.-China conflict, with both countries accusing each other of engaging in cyber theft and interference.

The U.S. government has repeatedly attributed cyberattacks on American companies and government agencies to Chinese hacking groups, leading to diplomatic fallout and increased tensions. In response, the U.S. has implemented a range of countermeasures, including sanctions and efforts to strengthen its own cybersecurity defenses.

China, on the other hand, has criticized U.S. cyber policies and accused the U.S. of using its technological superiority to engage in cyber espionage against China. The ongoing cyber conflict between these two nations is likely to intensify as both sides continue to invest in offensive and defensive cyber capabilities.


The Future of China’s Cybersecurity and Hacking Activities

Continued Expansion of Cyber Capabilities

As China continues to invest in cyber technologies, it is expected that the country will further enhance its offensive and defensive cyber capabilities. The government’s emphasis on cyber sovereignty and technological self-reliance suggests that China will continue to prioritize the development of its own homegrown cybersecurity solutions, reducing dependence on foreign technology providers.

The rise of new technologies, such as artificial intelligence, quantum computing, and blockchain, will likely play a central role in China’s cybersecurity strategy. These technologies can be leveraged to improve both offensive and defensive cyber capabilities, as well as to secure critical infrastructure and national assets.

Increased International Tensions and Cooperation

The global implications of China’s cyber activities are likely to continue to shape international relations and cybersecurity policies. As the geopolitical landscape evolves, countries will increasingly need to address the growing threat of cyberattacks and espionage, particularly in the context of the U.S.-China rivalry.

While tensions may increase, China’s growing presence in the international cyber community may also lead to new opportunities for collaboration, particularly in areas such as cybersecurity standards, cybercrime prevention, and the fight against global cyber threats.

As China’s cyber activities continue to evolve, their impact on global cybersecurity and geopolitics will remain significant, requiring international cooperation and vigilance to mitigate risks.

China Company Credit Report

Verify a Chinese company for only US$99 and receive a comprehensive credit report within 48 hours!

Buy Now