Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    DJI’s First 360 Camera Gives Insta360 a Run for Its Money

    August 16, 2025

    Apple Finally Destroyed Steve Jobs’ Vision of the iPad. Good

    August 16, 2025

    The Pixel 9 Pro Fold is $600 off ahead of the new model’s debut

    August 16, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies
    Security

    How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies

    News RoomBy News RoomJuly 21, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Topsec and Venustech were two firms alleged to have assisted these efforts. Topsec employed a number of former Honkers, including the founder of the Honker Union of China, and Topsec’s founder once acknowledged in an interview that the PLA directed his company. In 2015, Topsec was linked to state-sponsored cyber operations, including the Anthem Insurance breach in the US.

    Over the years, many tools used by China APT groups were built by Honkers, and the PLA and MSS mined them for vulnerability research and exploit development. In 1999, Huang Xin (glacier), a member of Green Army, released “Glacier,” a remote-access trojan. The next year, he and Yang Yong (coolc) from XFocus released X-Scan, a tool to scan networks for vulnerabilities that is still used by hackers in China today. In 2003, two members of Honker Union released HTRAN, a tool to hide an attacker’s location by rerouting their traffic through proxy computers, which has been used by China’s APTs. Tan and fellow NCPH member Zhou Jibing (whg) are believed to have created the PlugX backdoor in 2008, which has been used by more than 10 Chinese APTs. According to Benincasa, Zhou developed it even further to produce ShadowPad, which has been used by APT 41 and others.

    Over the years, leaks and US indictments against former Honkers have exposed their alleged post-Honker spy careers, as well as China’s use of for-profit firms for state hacking operations. The latter include i-Soon and Integrity Tech, both launched by former Honkers.

    Wu Haibo (shutdown), formerly of Green Army and 0x557, launched i-Soon in 2010. And last year, someone leaked internal i-Soon files and chat logs, exposing the company’s espionage work on behalf of the MSS and MPS. In March this year, eight i-Soon employees and two MPS officers were indicted by the US for hacking operations that targeted US government agencies, Asian foreign ministries, dissidents, and media outlets.

    Integrity Tech, founded in 2010 by former Green Army member Cai Jingjing (cbird), was sanctioned by the US this year over ties to global infrastructure hacks.

    This year, the US also indicted former Green Army members Zhou and Wu for conducting state hacking operations and sanctioned Zhou over links to APT 27. In addition to engaging in state-sponsored hacking, he allegedly also ran a data-leak service selling some of the stolen data to customers, including intelligence agencies.

    This isn’t unlike early-generation US hackers who also transitioned to become cybersecurity company founders and also got recruited by the National Security Agency and Central Intelligence Agency or hired by contractors to perform hacking operations for US operations. But unlike the US, China’s whole-of-society intelligence authorities have compelled some Chinese citizens and companies to collaborate with the state in conducting espionage, Kozy notes.

    “I think that China from the beginning just thought, ‘We can co-opt [the Honkers] for state interests.’” Kozy says. “And … because a lot of these young guys had patriotic leanings to begin with, they were kind of pressed into service by saying, ‘Hey you’re going to be doing a lot of really good things for the country.’ Also, many of them started to realize they could get rich doing it.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe Demise of China’s Hottest Online Shopping Craze
    Next Article Why tech billionaires want a dictatorship

    Related Posts

    Inside the Multimillion-Dollar Gray Market for Video Game Cheats

    August 13, 2025

    How to Protect Yourself From Portable Point-of-Sale Scams

    August 12, 2025

    Leak Reveals the Workaday Lives of North Korean IT Scammers

    August 11, 2025

    The US Court Records System Has Been Hacked

    August 11, 2025

    Ex-NSA Chief Paul Nakasone Has a Warning for the Tech World

    August 10, 2025

    Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds

    August 9, 2025
    Our Picks

    Apple Finally Destroyed Steve Jobs’ Vision of the iPad. Good

    August 16, 2025

    The Pixel 9 Pro Fold is $600 off ahead of the new model’s debut

    August 16, 2025

    Save on WIRED-Tested Gear for the New School Year. These Are the Best Deals

    August 16, 2025

    NASA Rewrites the Rules for Developers of Private Space Stations

    August 16, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Gear

    WIRED’s Guide to Buying a Used Plug-In Hybrid

    By News RoomAugust 16, 2025

    For those who really want to try a plug and have a slightly bigger budget,…

    If You Don’t Own a Multistyler, the Dyson Co-anda 2x Is the One to Get

    August 16, 2025

    Why did Laura Loomer leak that crazy deposition?

    August 15, 2025

    Make Your Bed Rock With the Best Mattress for Sex

    August 15, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.