Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google solves its Pixel 10 leaks by just showing us the phone

    July 21, 2025

    Citizen will share crime videos with the NYPD

    July 21, 2025

    Sony’s gamer-friendly X90L TV is on sale for a new low price

    July 21, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies
    Security

    How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies

    News RoomBy News RoomJuly 21, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Topsec and Venustech were two firms alleged to have assisted these efforts. Topsec employed a number of former Honkers, including the founder of the Honker Union of China, and Topsec’s founder once acknowledged in an interview that the PLA directed his company. In 2015, Topsec was linked to state-sponsored cyber operations, including the Anthem Insurance breach in the US.

    Over the years, many tools used by China APT groups were built by Honkers, and the PLA and MSS mined them for vulnerability research and exploit development. In 1999, Huang Xin (glacier), a member of Green Army, released “Glacier,” a remote-access trojan. The next year, he and Yang Yong (coolc) from XFocus released X-Scan, a tool to scan networks for vulnerabilities that is still used by hackers in China today. In 2003, two members of Honker Union released HTRAN, a tool to hide an attacker’s location by rerouting their traffic through proxy computers, which has been used by China’s APTs. Tan and fellow NCPH member Zhou Jibing (whg) are believed to have created the PlugX backdoor in 2008, which has been used by more than 10 Chinese APTs. According to Benincasa, Zhou developed it even further to produce ShadowPad, which has been used by APT 41 and others.

    Over the years, leaks and US indictments against former Honkers have exposed their alleged post-Honker spy careers, as well as China’s use of for-profit firms for state hacking operations. The latter include i-Soon and Integrity Tech, both launched by former Honkers.

    Wu Haibo (shutdown), formerly of Green Army and 0x557, launched i-Soon in 2010. And last year, someone leaked internal i-Soon files and chat logs, exposing the company’s espionage work on behalf of the MSS and MPS. In March this year, eight i-Soon employees and two MPS officers were indicted by the US for hacking operations that targeted US government agencies, Asian foreign ministries, dissidents, and media outlets.

    Integrity Tech, founded in 2010 by former Green Army member Cai Jingjing (cbird), was sanctioned by the US this year over ties to global infrastructure hacks.

    This year, the US also indicted former Green Army members Zhou and Wu for conducting state hacking operations and sanctioned Zhou over links to APT 27. In addition to engaging in state-sponsored hacking, he allegedly also ran a data-leak service selling some of the stolen data to customers, including intelligence agencies.

    This isn’t unlike early-generation US hackers who also transitioned to become cybersecurity company founders and also got recruited by the National Security Agency and Central Intelligence Agency or hired by contractors to perform hacking operations for US operations. But unlike the US, China’s whole-of-society intelligence authorities have compelled some Chinese citizens and companies to collaborate with the state in conducting espionage, Kozy notes.

    “I think that China from the beginning just thought, ‘We can co-opt [the Honkers] for state interests.’” Kozy says. “And … because a lot of these young guys had patriotic leanings to begin with, they were kind of pressed into service by saying, ‘Hey you’re going to be doing a lot of really good things for the country.’ Also, many of them started to realize they could get rich doing it.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe Demise of China’s Hottest Online Shopping Craze
    Next Article Why tech billionaires want a dictatorship

    Related Posts

    Hackers Are Finding New Ways to Hide Malware in DNS Records

    July 19, 2025

    Adoption Agency Data Exposure Revealed Information About Children and Parents

    July 19, 2025

    AI ‘Nudify’ Websites Are Raking in Millions of Dollars

    July 18, 2025

    Metadata Shows the FBI’s ‘Raw’ Jeffrey Epstein Prison Video Was Likely Modified

    July 17, 2025

    Skateboards and Livestreams: DHS Tells Police That Common Protest Activities Are ‘Violent Tactics’

    July 16, 2025

    4 Arrested Over Scattered Spider Hacking Spree

    July 16, 2025
    Our Picks

    Citizen will share crime videos with the NYPD

    July 21, 2025

    Sony’s gamer-friendly X90L TV is on sale for a new low price

    July 21, 2025

    T-Mobile is bringing low-latency tech to 5G for the first time

    July 21, 2025

    Why tech billionaires want a dictatorship

    July 21, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Security

    How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies

    By News RoomJuly 21, 2025

    Topsec and Venustech were two firms alleged to have assisted these efforts. Topsec employed a…

    The Demise of China’s Hottest Online Shopping Craze

    July 21, 2025

    Google’s leaked Pixel 10 images confirm a third camera

    July 21, 2025

    Some Cities in China Are Advertising Exclusive Subsidies for Huawei-Powered Cars

    July 21, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.