{"id":55438,"date":"2024-02-26T13:21:30","date_gmt":"2024-02-26T13:21:30","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35579\/Hackers-For-Sale-What-We-Learned-From-Chinas-Massive-Cyber-Leak.html"},"modified":"2024-02-26T13:21:30","modified_gmt":"2024-02-26T13:21:30","slug":"hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/","title":{"rendered":"Hackers For Sale: What We Learned From China&#8217;s Massive Cyber Leak"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.guim.co.uk\/img\/media\/f863ea71410267951743404e0e8d2bba90429b66\/0_200_6000_3600\/master\/6000.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=9ff66ef9313f07e34e64f8c83ee2853f\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"dcr-4cudl2\">A massive data leak from a Chinese cybersecurity firm has offered a rare glimpse into the inner workings of Beijing-linked hackers.<\/p>\n<p class=\"dcr-4cudl2\">Analysts say the leak is a treasure-trove of intel into the day-to-day operations of China\u2019s hacking programme, which the FBI says is the biggest of any country. The company, I-Soon, has yet to confirm the leak is genuine and has not responded to a request for comment. As of Friday, the leaked data was removed from the online software repository GitHub, where it had been posted.<\/p>\n<p class=\"dcr-4cudl2\">From staff complaints about pay and office gossip to claims of hacking foreign governments, here are some of the key insights from the leaks:<\/p>\n<figure id=\"8e32a46b-95ca-4e17-91f1-a92c1caddfce\" data-spacefinder-role=\"richLink\" data-spacefinder-type=\"model.dotcomrendering.pageElements.RichLinkBlockElement\" class=\" dcr-1your1i\"><gu-island name=\"RichLinkComponent\" priority=\"feature\" deferuntil=\"idle\" props=\"{&quot;richLinkIndex&quot;:3,&quot;element&quot;:{&quot;_type&quot;:&quot;model.dotcomrendering.pageElements.RichLinkBlockElement&quot;,&quot;prefix&quot;:&quot;Related: &quot;,&quot;text&quot;:&quot;Huge cybersecurity leak lifts lid on world of China\u2019s hackers for hire&quot;,&quot;elementId&quot;:&quot;8e32a46b-95ca-4e17-91f1-a92c1caddfce&quot;,&quot;role&quot;:&quot;richLink&quot;,&quot;url&quot;:&quot;https:\/\/www.theguardian.com\/technology\/2024\/feb\/23\/huge-cybersecurity-leak-lifts-lid-on-world-of-chinas-hackers-for-hire&quot;},&quot;ajaxUrl&quot;:&quot;https:\/\/api.nextgen.guardianapps.co.uk&quot;,&quot;format&quot;:{&quot;display&quot;:0,&quot;theme&quot;:0,&quot;design&quot;:10}}\" config=\"{&quot;renderingTarget&quot;:&quot;Web&quot;,&quot;darkModeAvailable&quot;:false}\"><\/gu-island><\/figure>\n<h2 id=\"who-got-hacked\">Who got hacked?<\/h2>\n<p class=\"dcr-4cudl2\">Every day, workers at I-Soon were targeting big fish.<\/p>\n<p class=\"dcr-4cudl2\">Government agencies of China\u2019s neighbours, including Kyrgyzstan, Thailand, Cambodia, Mongolia and Vietnam, had websites or email servers compromised, the leak revealed. There are long lists of targets, from British government departments to Thai ministries. I-Soon staff also boasted in leaked chats that they secured access to telecom service providers in Pakistan, Kazakhstan, Mongolia, Thailand and Malaysia, among others. They named the government of India \u2013 a geopolitical rival of Beijing\u2019s \u2013 as a key target for \u201cinfiltration\u201d. And they claimed to have secured back-end access to higher education institutions in Hong Kong and self-ruled Taiwan, which China claims as part of its territory. But they also admitted to having lost access to some of their data seized from government agencies in Myanmar and South Korea.<\/p>\n<p class=\"dcr-4cudl2\">Other targets are domestic, from China\u2019s northwestern region of Xinjiang to Tibet and from illegal pornography to gambling rings.<\/p>\n<h2 id=\"who-was-paying-i-soon\">Who was paying I-Soon?<\/h2>\n<p class=\"dcr-4cudl2\">Judging from the leaks, most of I-Soon\u2019s customers were provincial or local police departments \u2013 as well as province-level state security agencies responsible for protecting the Communist party from perceived threats to its rule. The firm also offered clients help protecting their devices from hacking and securing their communications \u2013 with many of their contracts listed as \u201cnon-secret\u201d.<\/p>\n<p class=\"dcr-4cudl2\">There were references to official corruption: in one chat, salesmen discussed selling the company\u2019s products to police \u2013 and planned to give kickbacks to those involved in the sale.<\/p>\n<p class=\"dcr-4cudl2\">There were also references to a client in Xinjiang, where Beijing is accused of grave human rights. But workers complained about the challenges of doing business in the tense region.<\/p>\n<p class=\"dcr-4cudl2\">\u201cEveryone thinks of Xinjiang like a nice big cake \u2026 but we have suffered too much there,\u201d one wrote.<\/p>\n<p class=\"dcr-4cudl2\">In their chats, I-Soon staffers told colleagues their main focuses were making \u201ctrojan horses\u201d \u2013 malware disguised as legitimate software that allows hackers access to private data \u2013 and building databases of personal information.<\/p>\n<p class=\"dcr-4cudl2\">\u201cAt the moment, the trojan horses are mainly customised for Beijing\u2019s state security department,\u201d one said.<\/p>\n<p class=\"dcr-4cudl2\">It also laid out how the firm\u2019s hackers could access and take over a person\u2019s computer remotely, allowing them to execute commands and monitor what they type, known as key logging. Other services included ways to breach Apple\u2019s iPhone and other smartphone operating systems, as well as custom hardware \u2013 including a power bank that can extract data from a device and send it to the hackers.<\/p>\n<p class=\"dcr-4cudl2\">In one screenshot of a conversation, someone describes a client request for exclusive access to the \u201cforeign secretary\u2019s office, foreign ministry\u2019s ASEAN office, prime minister\u2019s office, national intelligence agency\u201d and other government departments of an unnamed country.<\/p>\n<p class=\"dcr-4cudl2\">One service offered is a tool that allows clients to break into accounts on social media platform X, formerly Twitter, claiming to be able to obtain the phone number of a user and break into their private messages.<\/p>\n<p class=\"dcr-4cudl2\">I-Soon also boasts of a technique to bypass two-step authentication \u2013 a common login technique that offers an extra level of security to the account.<\/p>\n<h2 id=\"who-are-the-hackers\">Who are the hackers?<\/h2>\n<p class=\"dcr-4cudl2\">The leak also paints a less-than-flattering picture of the day-to-day goings-on at a mid-level Chinese cybersecurity firm.<\/p>\n<p class=\"dcr-4cudl2\">Employees\u2019 chats are full of complaints about office politics, lack of basic tech expertise, poor pay and management, and the challenges the company faced in securing clients. One set of screenshots showed arguments between an employee and a supervisor over salaries.<\/p>\n<p class=\"dcr-4cudl2\">And in another leaked chat, a staffer complained to their colleague that their boss had recently bought a car worth over 1m yuan ($139,000) instead of giving their team a pay rise.<\/p>\n<p class=\"dcr-4cudl2\">\u201cDoes the boss dream about being an emperor?\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35579\/Hackers-For-Sale-What-We-Learned-From-Chinas-Massive-Cyber-Leak.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10864],"class_list":["post-55438","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackerchinadata-losscyberwarspywaregoverment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers For Sale: What We Learned From China&#039;s Massive Cyber Leak 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers For Sale: What We Learned From China&#039;s Massive Cyber Leak 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-26T13:21:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/f863ea71410267951743404e0e8d2bba90429b66\/0_200_6000_3600\/master\/6000.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=9ff66ef9313f07e34e64f8c83ee2853f\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hackers For Sale: What We Learned From China&#8217;s Massive Cyber Leak\",\"datePublished\":\"2024-02-26T13:21:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\\\/\"},\"wordCount\":743,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/f863ea71410267951743404e0e8d2bba90429b66\\\/0_200_6000_3600\\\/master\\\/6000.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=9ff66ef9313f07e34e64f8c83ee2853f\",\"keywords\":[\"headline,hacker,china,data loss,cyberwar,spyware,goverment\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\\\/\",\"name\":\"Hackers For Sale: What We Learned From China's Massive Cyber Leak 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/f863ea71410267951743404e0e8d2bba90429b66\\\/0_200_6000_3600\\\/master\\\/6000.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=9ff66ef9313f07e34e64f8c83ee2853f\",\"datePublished\":\"2024-02-26T13:21:30+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/f863ea71410267951743404e0e8d2bba90429b66\\\/0_200_6000_3600\\\/master\\\/6000.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=9ff66ef9313f07e34e64f8c83ee2853f\",\"contentUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/f863ea71410267951743404e0e8d2bba90429b66\\\/0_200_6000_3600\\\/master\\\/6000.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=9ff66ef9313f07e34e64f8c83ee2853f\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,china,data loss,cyberwar,spyware,goverment\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerchinadata-losscyberwarspywaregoverment\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hackers For Sale: What We Learned From China&#8217;s Massive Cyber Leak\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers For Sale: What We Learned From China's Massive Cyber Leak 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/","og_locale":"en_US","og_type":"article","og_title":"Hackers For Sale: What We Learned From China's Massive Cyber Leak 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-02-26T13:21:30+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/f863ea71410267951743404e0e8d2bba90429b66\/0_200_6000_3600\/master\/6000.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=9ff66ef9313f07e34e64f8c83ee2853f","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hackers For Sale: What We Learned From China&#8217;s Massive Cyber Leak","datePublished":"2024-02-26T13:21:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/"},"wordCount":743,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/f863ea71410267951743404e0e8d2bba90429b66\/0_200_6000_3600\/master\/6000.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=9ff66ef9313f07e34e64f8c83ee2853f","keywords":["headline,hacker,china,data loss,cyberwar,spyware,goverment"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/","url":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/","name":"Hackers For Sale: What We Learned From China's Massive Cyber Leak 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/f863ea71410267951743404e0e8d2bba90429b66\/0_200_6000_3600\/master\/6000.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=9ff66ef9313f07e34e64f8c83ee2853f","datePublished":"2024-02-26T13:21:30+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/f863ea71410267951743404e0e8d2bba90429b66\/0_200_6000_3600\/master\/6000.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=9ff66ef9313f07e34e64f8c83ee2853f","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/f863ea71410267951743404e0e8d2bba90429b66\/0_200_6000_3600\/master\/6000.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=9ff66ef9313f07e34e64f8c83ee2853f"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hackers-for-sale-what-we-learned-from-chinas-massive-cyber-leak\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,china,data loss,cyberwar,spyware,goverment","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerchinadata-losscyberwarspywaregoverment\/"},{"@type":"ListItem","position":3,"name":"Hackers For Sale: What We Learned From China&#8217;s Massive Cyber Leak"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55438"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55438\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}