China unleashes hackers against its friend Russia, seeking war secrets
Since the beginning of the war in Ukraine, groups linked to the Chinese government have repeatedly hacked Russian companies and government agencies in an apparent search for military secrets, according to cyber analysts.
The intrusions started accelerating in May 2022, just months after Moscow's full-scale invasion. And they have continued steadily, with Chinese groups worming into Russian systems even as President Vladimir Putin of Russia and President Xi Jinping of China publicly professed a momentous era of collaboration and friendship.
The hacking campaign shows that, despite this partnership and years of promises not to hack each other, China sees Russia as a vulnerable target.
In 2023, one group, known as Sanyo, impersonated the e-mail addresses of a major Russian engineering firm in the hunt for information on nuclear submarines, according to TeamT5, a Taiwan-based cybersecurity research firm that discovered the attack in 2024 and linked it to the Chinese government.
China is far wealthier than Russia and has plenty of homegrown scientific and military expertise, but Chinese military experts often lament that Chinese troops lack battlefield experience. Experts say that China sees the war in Ukraine as a chance to collect information about modern warfare tactics, Western weaponry and what works against them.
'China likely seeks to gather intelligence on Russia's activities, including on its military operation in Ukraine, defense developments and other geopolitical maneuvers,' said Mr Che Chang, a researcher with TeamT5.
It is unclear how successful these attempts have been, partly because Russian officials have never publicly acknowledged these intrusions.
But a classified counterintelligence document from Russia's domestic security agency, known as the FSB, makes clear that intelligence officials are concerned. The document, obtained by The New York Times, says that China is seeking Russian defence expertise and technology and is trying to learn from Russia's military experience in Ukraine. The document refers to China as an 'enemy'.
With Mr Putin largely cut off from the West, his country has come to rely on China to buy its oil and sell it technology that is essential to its war effort. Moscow and Beijing have formed a bloc against Washington and its allies, alarming Western leaders. The FSB document presents a more complicated relationship than the 'no-limits' partnership that Mr Xi and Mr Putin describe.
Allies have been known to spy on one another, but the extent of China's hacking activities against Russia suggests both a higher level of mutual distrust and a reluctance by the Kremlin to share all that it is learning on the battlefield in Ukraine.
Drone warfare and software are of particular interest to China, the document says.
'The war in Ukraine fundamentally shifted intelligence priorities for both countries,' said Mr Itay Cohen, a senior researcher with cybersecurity firm Palo Alto Networks who has followed Chinese hacking groups for years.
Experts say, and the document indicates, that China wants to learn from Russia's war experience to bolster its own preparedness for potential future conflicts. Taiwan, in particular, is a major potential flashpoint with the West.
One Chinese government-funded group has targeted Rostec, the powerful Russian state-owned defense conglomerate, seeking information on satellite communications, radar and electronic warfare, according to Palo Alto Networks. Others have used malicious files, intended to exploit vulnerabilities in Microsoft Word, to penetrate Russian aviation industry targets and state bodies.
Messages seeking comment were left with the Kremlin and the Chinese Embassy in Moscow.
Not all Chinese hacking groups operate at the behest of the government. But security experts have seen evidence of government ties.
Russian cybersecurity firm Positive Technologies, for example, said in 2023 that cyberattacks had been mounted on several Russian targets, including in the aerospace, private security and defense sectors.
The attackers used a tool known as Deed RAT, which is widely deployed by Chinese state-sponsored hackers. Cybersecurity experts say Deed RAT is considered 'proprietary' among these groups and is not available for purchase on the dark web like other malware tools.
That has enabled state-backed hacking groups in China to use it more widely because it is tough for their adversaries to find a way to combat the malware.
Chinese state-sponsored hacking groups have often targeted international companies and government institutions, including in the United States and Europe. But hacking groups appear to have become more interested in Russian targets after the country's February 2022 invasion of Ukraine.
Mr Chang said he and his colleagues tracked several Chinese hacking groups targeting Russia. Among them was one of the country's most active hacking groups, known as Mustang Panda.
Little is known about Mustang Panda's origins or where it operates inside China, according to researchers who have studied the group. Its activities often accompanied China's Belt and Road economic development initiative, according to Mr Rafe Pilling, director of threat intelligence at security firm Sophos. As China invested in development projects in West Africa and Southeast Asia, he said, hacking soon followed.
That is most likely because China invests in countries where it has political and economic interests, which motivates state-sponsored hackers, Mr Pilling said.
After Russia invaded Ukraine, TeamT5 said that Mustang Panda expanded its scope to target governmental organizations in Russia and the European Union.
Mr Pilling, who has been monitoring Mustang Panda's activities for several years, says he suspects that the group is backed by China's Ministry of State Security, its main intelligence body.
The ministry supports threat groups that attack targets around the world, he said. In 2022, Mustang Panda targeted Russian military officials and border guard units near the Siberian border with China.
'The targeting we've observed tends to be political and military intelligence-gathering,' Mr Pilling said. That is true of all Chinese hacking groups targeting Russia, he said. 'I think of them as being one of the main tools that the Chinese state has for gathering political and economic intelligence.' NYTIMES
Join ST's Telegram channel and get the latest breaking news delivered to you.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Straits Times
an hour ago
- Straits Times
Thousands in Zagreb for Croatian nationalist singer's 'record breaking' concert
Sign up now: Get ST's newsletters delivered to your inbox ZAGREB - Tens of thousands of people flocked to Zagreb of Saturday to attend a show by controversial Croatian nationalist rock singer Marko Perkovic Thompson, which was being billed as the world's largest-ever paid concert. Police said more than 450,000 tickets had been sold for the concert at the Zagreb Hippodrome. Most of the streets in the Zagreb city centre were closed for traffic and some 6,523 policemen had been deployed. Thompson, who has had concerts banned in several European countries including the Netherlands, Switzerland and Bosnia, is accused by critics of flirting with the ideology and iconography of Croatia's Nazi-backed World War Two Ustashe government. The singer, who takes his nickname from the U.S. Thompson submachine gun and rose to popularity in the 1990s during and after the war that followed break-up of Yugoslavia, rejects accusations that his songs glorify the Nazi-backed state. Historians say the Ustashe systematically persecuted and murdered Jews, Serbs and Roma between 1941 and 1945. Thompson has previously said that his songs simply represent a love of God, family, homeland and people. His fans, many young and carrying or wearing Croatian flags, agreed. "I expect it to be good, great fun, lots of people and an unforgettable experience," said concert-goer Josip Gelenger. REUTERS

Straits Times
an hour ago
- Straits Times
Colombian police capture suspect in attack on Senator Uribe, sources say
Sign up now: Get ST's newsletters delivered to your inbox FILE PHOTO: A picture of Colombian Senator Miguel Uribe Turbay of the opposition Democratic Center party is seen at a tribute at a place where he was shot during a campaign event, in Bogota, Colombia, June 12, 2025. REUTERS/Luisa Gonzalez/File Photo BOGOTA - Colombian police have captured a fugitive accused of involvement in last month's attack on Senator Miguel Uribe, a potential presidential candidate, two sources with knowledge of the matter said on Saturday, marking the fifth arrest in the case. Elder Jose Arteaga, known as El Costeño, was arrested on suspicion of inducing the 15-year-old charged with shooting the politician at a rally in Colombia's capital Bogota on June 7 to commit the crime, the sources said. Arteaga, who the two sources said has a long criminal record, was detained in a neighborhood in western Bogota, a day after Colombian police said Interpol issued a red notice for his arrest. Colombian police chief Carlos Fernando Triana said in a post on social media on Friday that Arteaga was wanted for "aggravated attempted homicide; manufacture, trafficking and carrying of firearms or ammunition; and use of minors for the commission of crimes." Uribe - a 39-year-old presidential pre-candidate for the conservative opposition Democratic Center party - was shot twice in the head and once in his left leg, according to state prosecutors. He has undergone several serious surgeries since the attack, which left him in critical condition. The 15-year-old alleged shooter was arrested minutes after the attack, and three others have since been arrested. REUTERS

Straits Times
2 hours ago
- Straits Times
UK lawmaker from Farage's Reform removes himself from the party
Sign up now: Get ST's newsletters delivered to your inbox FILE PHOTO: A Reform UK party poster is seen outside a house ahead of the forthcoming Runcorn and Helsby parliamentary by-election in Frodsham, Britain, April 25, 2025. REUTERS/Phil Noble/File Photo LONDON - A British lawmaker from Nigel Farage's Reform UK party, James McMurdock, has removed himself from the party pending the outcome of an investigation into allegations relating to his business propriety, the right-wing party said on Saturday. McMurdock, one of five Reform lawmakers elected to join the UK's 650-strong parliament in the 2024 general election, will now sit as an independent, according to a statement on social media platform X from Reform's main enforcer of party discipline Lee Anderson. While the party - led by prominent Brexit campaigner Farage - has only a handful of lawmakers compared to the governing Labour Party's 403, it leads national opinion polls and gained noticeable ground from Labour in the local elections in May. "The allegations relate to business propriety during the pandemic and before (McMurdock) became an MP (Member of Parliament)," Anderson said in the statement. "At Reform UK we take these matters very seriously." McMurdock did not respond to a Reuters request for comment. The Reform statement said he has agreed to cooperate with any investigation following allegations which are likely to be published by a national newspaper. REUTERS