{"id":46887,"date":"2022-05-30T13:49:52","date_gmt":"2022-05-30T13:49:52","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33501\/The-Mystery-Of-Chinas-Sudden-Warnings-About-US-Hackers.html"},"modified":"2022-05-30T13:49:52","modified_gmt":"2022-05-30T13:49:52","slug":"the-mystery-of-chinas-sudden-warnings-about-us-hackers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/","title":{"rendered":"The Mystery Of China&#8217;s Sudden Warnings About US Hackers"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/china-matrix-800x413.jpg\" alt=\"Chinese flag with digital matrix -Innovation Concept - Digital Tech Wallpaper - 3D illustration\"><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/china-matrix.jpg\" class=\"enlarge-link\" data-height=\"1244\" data-width=\"2410\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Chinese flag with digital matrix -Innovation Concept &#8211; Digital Tech Wallpaper &#8211; 3D illustration<\/div>\n<div class=\"caption-credit\">peterschreiber.media | Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a title=\"57 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/05\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">75<\/span> <span class=\"visually-hidden\"> with 57 posters participating<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p> <!-- cache hit 237:single\/related:611553d5bdd588d844de3565d0e45624 --><!-- empty --><\/p>\n<p>For the best part of a decade, US officials and cybersecurity companies have been naming and shaming hackers they believe work for the Chinese government. These hackers <a href=\"https:\/\/www.wired.com\/2013\/02\/chinese-army-linked-to-hacks\/\">have stolen<\/a> terabytes of data from companies like pharmaceutical and <a href=\"https:\/\/www.wired.com\/story\/chinese-hackers-charged-decade-long-crime-spying-spree\/\">video game firms<\/a>, <a href=\"https:\/\/www.wired.com\/story\/fbi-takes-drastic-step-to-fight-china-hacking-spree\/\">compromised servers<\/a>, <a href=\"https:\/\/www.wired.com\/story\/the-full-story-of-the-stunning-rsa-hack-can-finally-be-told\/\">stripped security protections<\/a>, and <a href=\"https:\/\/www.wired.com\/story\/china-nsa-hacking-tool-epme-hijack\/\">highjacked hacking tools<\/a>, according to security experts. And as <a href=\"https:\/\/www.wired.com\/story\/china-hacking-reckless-new-phase\/\">China\u2019s alleged hacking has grown more brazen<\/a>, individual Chinese hackers face indictments. However, things may be changing.<\/p>\n<p>Since the start of 2022, China\u2019s Foreign Ministry and the country\u2019s cybersecurity firms have increasingly been calling out alleged US cyberespionage. Until now, these allegations have been a rarity. But the disclosures come with a catch: They appear to rely on years-old technical details, which are already publicly known and don\u2019t contain fresh information. The move may be a strategic change for China as the nation tussles to cement its position as a tech superpower.<\/p>\n<p>\u201cThese are useful materials for China\u2019s tit-for-tat propaganda campaigns when they faced US accusation and indictment of China\u2019s cyberespionage activities,\u201d says Che Chang, a cyber threat analyst at the Taiwan-based cybersecurity firm TeamT5.<\/p>\n<p>China\u2019s accusations, which were <a href=\"https:\/\/riskybiznews.substack.com\/p\/risky-biz-news-china-complains-about\">noted<\/a> by security journalist Catalin Cimpanu, all follow a very similar pattern. On February 23, Chinese security company Pangu Lab <a href=\"https:\/\/www.pangulab.cn\/post\/the_bvp47_a_top-tier_backdoor_of_us_nsa_equation_group\/\">published<\/a> allegations that the US National Security Agency\u2019s elite <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2015_equation-group-the-crown-creator-of-cyber-espionage\">Equation Group<\/a> hackers used a backdoor, dubbed Bvp47, to monitor 45 countries. The Global Times, a tabloid newspaper that\u2019s part of China\u2019s state-controlled media, ran an <a href=\"https:\/\/www.globaltimes.cn\/page\/202202\/1252952.shtml\">exclusive report<\/a> on the research. Weeks later, on March 14, the newspaper had a second <a href=\"https:\/\/www.globaltimes.cn\/page\/202203\/1254856.shtml\">exclusive story about another<\/a> NSA tool, NOPEN, based on details from China\u2019s National Computer Virus Emergency Response Center. A week later, Chinese cybersecurity firm Qihoo 360 <a href=\"https:\/\/finance.yahoo.com\/news\/china-cybersecurity-firm-alleges-us-093000291.html\">alleged<\/a> that US hackers had been attacking Chinese companies and organizations. And on April 19, the Global Times <a href=\"https:\/\/www.globaltimes.cn\/page\/202204\/1259749.shtml\">reported<\/a> on further National Computer Virus Emergency Response Center findings about HIVE, malware developed by the CIA.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>The reports are accompanied with a flurry of statements\u2014often in response to questions from the media\u2014by China\u2019s Foreign Ministry spokespeople. \u201cChina is gravely concerned over the irresponsible malicious cyber activities of the US government,\u201d Foreign Ministry spokesperson Wang Wenbin <a href=\"http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202204\/t20220420_10670511.htm\">said<\/a> in April after one of the announcements. \u201cWe urge the US side to explain itself and immediately stop such malicious activities.\u201d Over the first nine days of May, Foreign Ministry spokespeople commented on US cyber <a href=\"http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202205\/t20220505_10681955.htm\">activities<\/a> at least <a href=\"http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202205\/t20220506_10682555.htm\">three<\/a> <a href=\"https:\/\/www.fmprc.gov.cn\/mfa_eng\/xwfw_665399\/s2510_665401\/2511_665403\/202205\/t20220509_10683549.html\">times<\/a>. \u201cOne cannot whitewash himself by smearing others,\u201d Zhao Lijian said in <a href=\"http:\/\/us.china-embassy.gov.cn\/eng\/fyrth\/202205\/t20220505_10681955.htm\">one instance<\/a>.<\/p>\n<p>While cyber activity undertaken by state actors is often wrapped in highly classified files, many hacking tools developed by the US are no longer secret. In 2017, WikiLeaks published 9,000 documents in the <a href=\"https:\/\/www.wired.com\/tag\/vault-7\/\">Vault7 leaks<\/a>, which detailed many of the CIA\u2019s tools. A year earlier, the mysterious <a href=\"https:\/\/www.wired.com\/tag\/shadow-brokers\/\">Shadow Brokers<\/a> hacking group stole data from one of the NSA\u2019s elite hacking teams and slowly dripped the data to the world. The Shadow Brokers leaks included dozens of exploits and new <a href=\"https:\/\/www.wired.com\/2016\/08\/shadow-brokers-mess-happens-nsa-hoards-zero-days\/\">zero-days<\/a>\u2014including the <a href=\"https:\/\/www.wired.com\/story\/eternalblue-leaked-nsa-spy-tool-hacked-world\/\">Eternal Blue<\/a> hacking tool, which has since been used repeatedly in some of the <a href=\"https:\/\/www.wired.com\/story\/eternalblue-leaked-nsa-spy-tool-hacked-world\/\">largest cyberattacks<\/a>. Many of the details in the Shadow Brokers leaks match up with details about NSA which were <a href=\"https:\/\/www.wired.com\/2013\/12\/nsa-hacking-catalogue\/\">disclosed by Edward Snowden in 2013<\/a>. (An NSA spokesperson said it has \u201cno comment\u201d for this story; the agency routinely does not comment on its activities.)<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33501\/The-Mystery-Of-Chinas-Sudden-Warnings-About-US-Hackers.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46888,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[2787],"class_list":["post-46887","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentusachinacyberwar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Mystery Of China&#039;s Sudden Warnings About US Hackers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Mystery Of China&#039;s Sudden Warnings About US Hackers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-30T13:49:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/china-matrix-800x413.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Mystery Of China&#8217;s Sudden Warnings About US Hackers\",\"datePublished\":\"2022-05-30T13:49:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/\"},\"wordCount\":597,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/the-mystery-of-chinas-sudden-warnings-about-us-hackers.jpg\",\"keywords\":[\"headline,hacker,government,usa,china,cyberwar\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/\",\"name\":\"The Mystery Of China's Sudden Warnings About US Hackers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/the-mystery-of-chinas-sudden-warnings-about-us-hackers.jpg\",\"datePublished\":\"2022-05-30T13:49:52+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/the-mystery-of-chinas-sudden-warnings-about-us-hackers.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/the-mystery-of-chinas-sudden-warnings-about-us-hackers.jpg\",\"width\":800,\"height\":413},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,china,cyberwar\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusachinacyberwar\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Mystery Of China&#8217;s Sudden Warnings About US Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Mystery Of China's Sudden Warnings About US Hackers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/","og_locale":"en_US","og_type":"article","og_title":"The Mystery Of China's Sudden Warnings About US Hackers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-30T13:49:52+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/china-matrix-800x413.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Mystery Of China&#8217;s Sudden Warnings About US Hackers","datePublished":"2022-05-30T13:49:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/"},"wordCount":597,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/the-mystery-of-chinas-sudden-warnings-about-us-hackers.jpg","keywords":["headline,hacker,government,usa,china,cyberwar"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/","url":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/","name":"The Mystery Of China's Sudden Warnings About US Hackers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/the-mystery-of-chinas-sudden-warnings-about-us-hackers.jpg","datePublished":"2022-05-30T13:49:52+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/the-mystery-of-chinas-sudden-warnings-about-us-hackers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/the-mystery-of-chinas-sudden-warnings-about-us-hackers.jpg","width":800,"height":413},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-mystery-of-chinas-sudden-warnings-about-us-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,china,cyberwar","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusachinacyberwar\/"},{"@type":"ListItem","position":3,"name":"The Mystery Of China&#8217;s Sudden Warnings About US Hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46887"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46887\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46888"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}