Cyberwarfare / Nation-State Attacks,
Fraud Management & Cybercrime
Leak Exposes China’s Hack-For-Hire Activities

Recent analysis by cybersecurity firm SpyCloud has uncovered significant leaks revealing the inner workings of private hacking firms in China that operate under the guise of assisting government agencies, particularly those affiliated with the military. The data breaches exposed by SpyCloud centered on a threat actor known as Salt Typhoon, linked to a series of government-sponsored hacking activities.
In May, SpyCloud noted the circulation of data sets on illicit forums, purportedly sourced from China’s hack-for-hire market. This vast network comprises companies that accept direct tasking from intelligence agencies and engage in speculative operations aimed at selling stolen information back to the state. The leaked data included sensitive information such as IP addresses of compromised routers and personal details of individuals associated with these operations.
SpyCloud corroborated the legitimacy of the leaks by verifying personal details against real identities in China. Researchers noted that some router usernames matched those from actual Chinese internet service providers, emphasizing the weight of the findings. Notably, one contract identified in the leak linked a Beijing-based hacking firm to a military contractor for the People’s Liberation Army (PLA).
As a result of these investigations, the U.S. federal government has pinpointed various Chinese companies engaged in these activities, notably naming Sichuan Juxinhe Network Technology as a contractor for Salt Typhoon. Furthermore, indictments were announced against suspected hackers associated with this group, emphasizing the significant international implications of such state-sponsored cyber operations.
The leaked data also included financial records detailing transactions between hackers and their clients, revealing a structured environment operating within the hack-for-hire ecosystem. The MITRE ATT&CK framework suggests that techniques such as initial access through credential dumping and command and control via compromised networks could have played roles in the various breaches associated with Salt Typhoon’s activities.
SpyCloud highlighted that several contractors remain unidentified, including entities like Beijing Huanyu Tiangiong Information Technology, indicating the extensive nature of this hack-for-hire network. Researchers also revealed ties to government entities like the PLA Unit 61419, known for past cyber operations against Japan’s space agency.
The dependencies of the Chinese government on these hacking-for-hire firms illustrate an ecosystem where corruption flourishes, fueling state-sponsored data collection initiatives. Experts reiterate that operations performed through front companies provide advantageous non-attribution capabilities, while simultaneously allowing for profitable engagements with state agencies.
The revelations concerning China’s hack-for-hire activities offer a glimpse into the operational mechanics of state-sanctioned cyber warfare. As the global community becomes more aware of these tactics, organizations worldwide must remain vigilant and proactive against the growing risks of state-sponsored cyber threats.