Close Menu

    Stay Ahead with Exclusive Updates!

    Enter your email below and be the first to know what’s happening in the ever-evolving world of technology!

    What's Hot

    Token Efficiency: Why Aria Networks Raised $125M for AI-Native Infrastructure

    April 18, 2026

    Virtual Safeguards: China Bans Addictive “Digital Humans” for Minors

    April 18, 2026

    Grid-Responsive AI: How Nvidia Plans to Turn Data Centers Into Power Assets with Emerald AI

    April 16, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter)
    PhronewsPhronews
    • Home
    • Big Tech & Startups

      Token Efficiency: Why Aria Networks Raised $125M for AI-Native Infrastructure

      April 18, 2026

      Virtual Safeguards: China Bans Addictive “Digital Humans” for Minors

      April 18, 2026

      Grid-Responsive AI: How Nvidia Plans to Turn Data Centers Into Power Assets with Emerald AI

      April 16, 2026

      The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

      April 15, 2026

      The Sacramento Blueprint: How California is Writing the U.S. AI Rulebook

      April 14, 2026
    • Crypto

      Quantum Computing Advances Force Coinbase and Institutional Custodians to Rethink Crypto Security

      March 8, 2026

      AI Assisted Hacking Groups Target Crypto Firms With Multi-Layered Social Engineering

      February 18, 2026

      Global Crypto Regulations Expand as 2026 Begins With New Data Collection Frameworks and National Laws

      January 16, 2026

      Coinbase Bets on Stablecoin and On-Chain Growth as Key Market Drivers in 2026 Strategy

      January 10, 2026

      Tether Faces Ongoing Transparency Questions and Reserve Scrutiny Amid Massive Bitcoin Accumulation

      January 5, 2026
    • Gadgets & Smart Tech
      Featured

      AirPods Max 2: USB-C, Live Translation, and the H2 Upgrade

      By preciousMarch 26, 2026
      Recent

      AirPods Max 2: USB-C, Live Translation, and the H2 Upgrade

      March 26, 2026

      How ABB and Nvidia are Perfecting Industrial Robotics using AI Simulation

      March 20, 2026

      Neura Robotics Reaches €4B Valuation With Tether Backing

      March 12, 2026
    • Cybersecurity & Online Safety

      Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

      April 16, 2026

      Your Company Could Be Iran’s Next Target: What U.S. Tech Firms Need to Do Right Now

      April 6, 2026

      Google Is Warning Us About The Encryption Protecting Your Data Today. It May Not Survive Quantum Computing

      April 5, 2026

      Accenture and Anthropic Team Up on AI-powered Cybersecurity

      April 4, 2026

      Your BVN, Passport, and Bank Account May Already Be on the Dark Web. What Every Nigerian Must Do Right Now After the Banking Breaches

      April 4, 2026
    PhronewsPhronews
    Home»Cybersecurity & Online Safety»DOJ Indicts 12 Chinese Hackers In US Treasury Cyberattack
    Cybersecurity & Online Safety

    DOJ Indicts 12 Chinese Hackers In US Treasury Cyberattack

    preciousBy preciousMarch 11, 2025Updated:June 12, 2025No Comments
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The U.S. Department of Justice has indicted 12 Chinese-backed hackers who initiated several cyberattacks against large corporations in the country, including the U.S. Treasury Cyberattack.

    The Treasury cyberattack was announced via a letter from the DOJ, confirming there was unauthorized access to unclassified documents in the U.S. Treasury Departmental Offices. 

    The cyberattack was as a result of the exploitation of two pairs of vulnerabilities (CVE-2024-12356 and CVE-2024-12686) in a third-party software provided by BeyondTrust, a third-party SaaS (Software-as-a-Service) and a Cybersecurity firm, offering services including but not limited to Identity Security Platform, Privileged Access Management (PAM), and Remote Access Technology.

    “On December 8, 2024, Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to a key used by the vendor to secure a cloud-based service used to remotely provide technical support for Treasury Departmental Offices (DO) end users,” the letter says.

    The letter then adds that “with access to the stolen key, the threat actor was able to override the service’s security, remotely access certain Treasury DO user workstations, and access certain unclassified documents maintained by those users.”

    In a culminating effort of national agencies CISA (Cybersecurity and Infrastructure Security Agency) and FBI (Federal Bureau of Investigation), the cyberattack was alleged to be sponsored by the government of the PRC (People Republic of China), and was dubbed APT27. 

    “The incident has been attributed to a China state-sponsored Advanced Persistent Threat (APT) actor,” the letter further explains.

    As a result of the wide range of cyberattacks carried out by this threat actor between 2013 and 2024, and according to the DOJ indictment, APT27 has been given several nicknames by many private sector security researchers: “Threat Group 3390,” “Bronze Union,” “Emissary Panda,” “Lucky Mouse,” “Iron Tiger,” “UTA0178,” “UNC 5221,” and “Silk Typhoon.”

    In the press release announcing the indictment of 12 Chinese nationals – 2 officers of the PRC’s Ministry of Public Security (MPS), 2 Chinese nationals at the helm of APT27, and 8 employees of a PRC private company Anxun Information Technology Co. Ltd. (aka i-Soon) – the names of APT27’s  threat actors were said to be Yin Kecheng and Zhou Shuai. 

    Yin and Zhou are Chinese nationals who allegedly launched cyberattacks against U.S. large corporations – for example, Microsoft – on behalf of the Chinese government.

    The cyberattacks carried out by these two dates back to 2013. Before the recent Treasury cyberattack in December 2024, they were reported to have “exploited vulnerabilities in victim networks, conducted reconnaissance once inside those networks, and installed malware, such as PlugX malware, that provided persistent access,” according to the indictment.

    “The defendants (Yin and Zhou) and their co-conspirators then identified and stole data from the compromised networks by exfiltrating it to servers under their control,” adds the press release announcing the charges.

    “Next, they brokered stolen data for sale and provided it to various customers, only some of whom had connections to the PRC government and military. For example, Zhou sold data stolen by Yin through i-Soon, whose primary customers, as noted above, were PRC government agencies, including the MSS and the MPS.”

    Due to the large scale of these cyberattacks, Kecheng and Shuai have been placed on a wanted list with a bounty offered to anyone who provides information on their whereabouts. 
    “The Department of State’s Bureau of International Narcotics and Law Enforcement Affairs is announcing two reward offers under the Transnational Organized Crime Rewards Program (TOCRP) of up to $2 million each for information leading to the arrests and convictions, in any country, of malicious cyber actors Yin Kecheng and Zhou Shuai, both Chinese nationals residing in China.”

    Anxun Information Technology APT27 BeyondTrust vulnerabilities Bronze Union China cyber espionage Chinese state-sponsored hacking Chinese-backed hackers CISA CVE-2024-12356 CVE-2024-12686 cyber intelligence cyberattack attribution cyberattack indictment cybercrime rewards cybersecurity breach cybersecurity vulnerability exploitation data exfiltration DOJ indictment Emissary Panda espionage data theft FBI cyber investigation federal charges against hackers government-sponsored cyber threat i-Soon international cyber law Iron Tiger Lucky Mouse malicious cyber actors Microsoft cyberattack PlugX malware PRC government cyber operations PRC Ministry of Public Security Silk Typhoon Threat Group 3390 transnational organized crime US Treasury cyberattack Yin Kecheng Zhou Shuai
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    precious
    • LinkedIn

    I’m Precious Amusat, Phronews’ Content Writer. I conduct in-depth research and write on the latest developments in the tech industry, including trends in big tech, startups, cybersecurity, artificial intelligence and their global impacts. When I’m off the clock, you’ll find me cheering on women’s footy, curled up with a romance novel, or binge-watching crime thrillers.

    Related Posts

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026

    Your Company Could Be Iran’s Next Target: What U.S. Tech Firms Need to Do Right Now

    April 6, 2026

    Google Is Warning Us About The Encryption Protecting Your Data Today. It May Not Survive Quantum Computing

    April 5, 2026

    Comments are closed.

    Top Posts

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025

    Anthropic Will Use Claude User Chats For Data Training

    October 16, 2025
    Don't Miss
    Artificial Intelligence & The Future

    Token Efficiency: Why Aria Networks Raised $125M for AI-Native Infrastructure

    By preciousApril 18, 2026

    Aria Networks, a Palo Alto-based networking startup founded in January 2025, has raised $125 million…

    Virtual Safeguards: China Bans Addictive “Digital Humans” for Minors

    April 18, 2026

    Grid-Responsive AI: How Nvidia Plans to Turn Data Centers Into Power Assets with Emerald AI

    April 16, 2026

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026
    Stay In Touch
    • Facebook
    • Twitter
    About Us
    About Us

    Evolving from Phronesis News, Phronews brings deep insight and smart analysis to the world of technology. Stay informed, stay ahead, and navigate tech with wisdom.
    We're accepting new partnerships right now.

    Email Us: info@phronews.com

    Facebook X (Twitter) Pinterest YouTube
    Our Picks
    Most Popular

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025
    © 2025. Phronews.
    • Home
    • About Us
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions

    Type above and press Enter to search. Press Esc to cancel.