hacking group has exposed extensive cyber intrusions conducted by Beijing's intelligence and military entities against foreign governments, companies, and infrastructure.
According to a report by The Washington Post, the leaked cache, comprising over 570 files, images, and chat logs, provides a rare insight into the operations of a firm hired by Chinese government agencies for on-demand, mass data-collecting operations.
The files, posted on GitHub last week, reveal contracts spanning eight years aimed at extracting foreign data. The targets include at least 20 foreign governments and territories, such as India, Hong Kong, Thailand, South Korea, the United Kingdom, Taiwan, and Malaysia.
The leaked documents are attributed to iSoon, also known as Auxun, a Shanghai-based Chinese firm providing third-party hacking and data-gathering services to government bureaus, security groups, and state-owned enterprises. The trove focuses on listed targets rather than data extracted from Chinese hacking operations.
(Join our ETNRI WhatsApp channel for all the latest updates)
The leaked spreadsheet indicates successful breaches of 80 overseas targets, including 95.2 gigabytes of immigration data from India and a 3 terabyte collection of call logs from South Korea's LG U Plus telecom provider. Targets also extended to infrastructure data, with 459GB of road-mapping data from Taiwan, crucial for military operations, among the extracted information.
While most targets were in Asia, iSoon's reach extended globally, with chat logs