A massive cache of leaked documents from a Chinese hacking contractor further underscores the global cybersecurity threats posed by China’s communist regime, experts say.
“The I-Soon incident should once again remind everyone that network security is national security. There is a war without gunpowder, and it is happening in cyberspace,” tech expert Chiang Ya-chi told The Epoch Times on Feb. 21.
Ms. Chiang is the president of the Taiwan Law and Technology Association and a professor who specializes in internet technology and intellectual property law at National Taiwan Ocean University.
The leaked documents show that I-Soon is funded by the Chinese Communist Party (CCP), Ms. Chiang said, adding that Bejing uses tools developed by firms such as I-Soon to infiltrate foreign governments and entities.
Spyware
Since the online dump last week, many researchers and experts have published their analysis of the documents written in Simplified Chinese.
The analysis highlights some of the I-Soon products revealed by the documents, including what it calls a “Twitter stealer.”
“Features [of the Twitter stealer] include obtaining the user’s Twitter email and phone number, real-time monitoring, reading personal messages, and publishing tweets on the user’s behalf,” the analysis says.
In one document page, I-Soon boasts that it had studied Twitter’s safety mechanism for years; thus, its product can allegedly bypass security features to target a Twitter user’s account.
The Malwarebytes analysis shows the following product description: “Custom Remote Access Trojans (RATs) for Windows x64/x86: Features include process/service/registry management, remote shell, keylogging, file access logging, obtaining system information, disconnecting remotely, and uninstallation.”
There are iOS and Android versions of the RATs. The iOS model claims to support all iOS device versions without jailbreaking, with features ranging from hardware information to GPS data, contacts, media files, and real-time audio records as an extension, according to the analysis.
I-Soon also has portable devices for “attacking networks from the inside,” it adds.
The user lookup databases, which include users’ phone numbers, names, and email addresses, can be correlated with social media accounts, the Malwarebytes analysis says.
Threats
Su Tzu-yun, director at the Taiwan-based Institute for National Defense and Security Research, told The Epoch Times on Feb. 21 that the I-Soon documents are the latest evidence supporting claims by the United States and NATO that the Chinese regime is a threat to their cybersecurity.
“It shows explicitly how government targeting requirements drive a competitive marketplace of independent contractor hackers-for-hire.”