Skip to main content
TradeCompliance.io

Main navigation

  • Home
  • 101s
    • Proliferation Finance
    • Export Controls
    • Trade Compliance in Universities and Research Institutes
  • Industry Guidance
    • Introduction
    • Strategic Competition
    • Acquisition Methods
    • Sectoral Analysis
    • Case Studies
    • Red Flags
    • Compliance and Due Diligence
    • Conclusions
  • About

Breadcrumb

  1. Home

3 - Provincial Ministry of Security Involved in Hacking Scheme

  • < prev
  • Guidance Introduction
  • next >

The PRC has many instances of economic espionage but very rarely are they linked directly to government organizations as explicitly as in 2018. In this instance, hackers and insiders were alleged to be working for the Jiangsu Province Ministry of State Security (JSSD). This branch of the Chinese Ministry of State Security represents the Jiangsu Province, the capital of which is Nanjing. The PRC tends to have hubs for specific industries in specific provinces as part of their military-civil fusion strategy. Jiangsu Province is known for exporting electronic equipment and other high-tech goods and it one of the wealthiest provinces in China.

The Department of Justice states that the JSSD hired a team of hackers comprised of Zhang Zhang-Gui, Liu Chunliang, Gao Hong Kun, Zhuang Xiaowei, and Ma Zhiqi. Their primary responsibility was to steal technology related to turbofan engines, namely those used in commercial aircraft. To facilitate this, the group hacked into a French aerospace manufacturer’s office in Suzhou, Jiangsu Province. Additionally, this engine technology was in development with American aerospace manufacturers which meant the hackers were able to gain access to other companies involved in the manufacturing of the turbofan engine.

These hacks included companies in three states: Arizona, Massachusetts, and Oregon. During the investigation, justice department officials concluded that a separate Chinese state-owned enterprise working in aerospace was working to develop a similar engine. According to the justice department, the hackers used the following methods to intrude companies and steal their data: “spear phishing, sowing multiple different strains of malware into company computer systems, using the victim companies’ own websites as ‘watering holes’ to compromise website visitors’ computers, and domain hijacking through the compromise of domain registrars.”

While the team of hackers was the primary tool used to obtain this information, the operation included efforts to recruit members of the U.S. Army to cooperate with JSSD intelligence agents as well as employees of foreign companies. In the instance of the French company based in Suzhou, two employees named Tian Xi and Gu Gen were recruited by the JSSD to employ malware onto the network in the Suzhou office. When the malware was discovered, “conspirators Chai Meng and Liu Chunliang tried to minimize JSSD’s exposure by causing the deletion of the domain linking the malware to an account controlled by members of the conspiracy.”

Lastly, Zhang Zhang-Gui was charged, as well as his co-conspirator, Li Xiao, with supplying malware used to hack Capstone Turbine. Li used the malware, amongst other things, to repeatedly intrude the networks of Capstone and a San Diego-based IT firm.

Footnotes

[1] https://www.justice.gov/opa/pr/chinese-intelligence-officers-and-their-recruited-hackers-and-insiders-conspired-steal

  • < prev
  • Guidance Introduction
  • next >

Download as a PDF

Sectoral Guidance

Sectoral Guidance

  • Sectoral Guidance
  • Introduction
  • Strategic Competition
  • Implications at the National Level
  • Trends in Technology Acquisition
  • Sectoral Analysis
  • Red Flags
  • Compliance and Due Diligence
  • Potential Additions to ICP
  • Use of Distributors
  • Conclusions
  • Annex 1: Case Studies
  • Annex 2: Further Resources and Guidance
  • Annex 3: Due Diligence Tools and Techniques
  • Sectoral Guidance PDF

Site Maintained By The James Martin Center for Nonproliferation Studies (Washington DC Office) Suite 1225, 1400K Street, Washington DC, 20005, USA. Email [email protected]

User account menu

  • Log in