There were two firms of Tuppesk and Winstine, who were accused of helping them. Tappsk hired several former Hunkers, including the founder of China’s Hanker Union, and in an interview, the founder of Tappsk acknowledged that the PLA had directed his company. In 2015, Tapsk was linked to state -sponsored cyber operations, including a violation of anthem insurance in the United States.
Over the years, many tools used by China APT groups were built by Hunkers, and PLA and MSS mined for endangering research and development. In 1999, Huangzan (Glacier), a Green Army member, released “Glacier”, a remote access to Trojan. Next year, he and Yang Yong (Kolkata) released the X -Fox -based X -scan, which still uses hackers in China. In 2003, two members of the Hanker Union released Hitran, which was a device to hide its traffic through proxy computers, which was used by China’s APT. It is believed that Tan and fellow NCPH member Zhou Pocket (WHG) formed a plug -backdoor in 2008, used by more than 10 Chinese APT. According to Bannakasa, Chow made even more progress to produce shadow pads, which APT41 and others have been using.
Over the years, leaks against ex -Hunkers and the US person have used their alleged spy career as well as China’s profitable firms for state hacking operations. The latter includes I-Son and integrity, both were launched by former Hunkers.
Woo Hibo (Shutdown), earlier from the Green Army and 0x557, started the Eye Son in 2010. And last year, someone leaked internal icon files and chat logs by exposing the company’s spying work by MSS and MPS. In March this year, the United States charged eight-Son employees and two MPs for hacking operations, which targeted US government agencies, ministries of Asian ministries, differences and media.
The Integrity Tech, founded in 2010 by former Green Army member Kai Janging (CBRID), was approved this year by the United States against global infrastructure hex relations.
This year, the United States also charged former Green Army members, Zhou and Woo, to conduct state hacking operations and approved Zhou on links to APT27. In addition, in addition to being involved in hacking under state patronage, it allegedly operated some data leak service to consumers, including intelligence agencies.
This is not contrary to early -generation American hackers who also transferred to the founder of the CyberScurement Company and also recruited by the National Security Agency and the Central Intelligence Agency or kept a hacking operation for US operations by contractors. But unlike the United States, China’s Society Intelligence officials have forced some Chinese citizens and companies to cooperate with the state in conducting spying, Kozi notice.
Kozi says, “I think China from the beginning thought,” We can cooperate for state interests. ” “And … since many of these young people had a patriotic inclination, they were pressed into the service, saying,” Hey you are doing a lot of good things for the country. ” Also, many of them began to realize that they could do it.


