Close Menu
    Facebook X (Twitter) Instagram
    Tuesday, January 20
    Top Stories:
    • UK Considers Social Media Ban for Under-16s: What’s at Stake?
    • Unlock Disney+ and Hulu for Just $10 This Month!
    • Unlock 3 Months for Just $3!
    Facebook X (Twitter) Instagram Pinterest Vimeo
    IO Tribune
    • Home
    • AI
    • Tech
      • Gadgets
      • Fashion Tech
    • Crypto
    • Smart Cities
      • IOT
    • Science
      • Space
      • Quantum
    • OPED
    IO Tribune
    Home » 12 Chinese Hackers Charged in Massive US Treasury Cyberattack
    Tech

    12 Chinese Hackers Charged in Massive US Treasury Cyberattack

    Lina Johnson MercilliBy Lina Johnson MercilliMarch 6, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Essential Insights

    1. The DOJ has criminally charged 12 Chinese nationals for cyberattacks against over 100 US organizations, including the Treasury, with activities dating back to 2013.

    2. Many of the accused are linked to the Ministry of Public Security (MPS) and the Ministry of State Security (MSS), with some affiliated with a Chinese company, i-Soon, that specialized in hacking and selling stolen data.

    3. i-Soon is reported to have generated millions in revenue through cyberattacks, including training MPS employees and conducting intrusions at the government’s request, with fees ranging from $10,000 to $75,000 per exploited account.

    4. The DOJ is offering up to $10 million for info leading to the identification of the accused, with specific rewards of $2 million for the arrest of two members of the hacking group Silk Typhoon, responsible for broad targeting of U.S. entities.

    The recent indictment of 12 Chinese hackers represents a significant moment in the ongoing battle against cybercrime. According to the Department of Justice (DOJ), these individuals targeted over 100 U.S. organizations, including the Treasury, over a span of several years. This type of persistent threat underscores a broader issue concerning cybersecurity and international relations.

    Firstly, the indictment highlights a concerning trend. Hackers operate within a framework that includes state-sponsored activities and private enterprise. Two of the accused work for China’s Ministry of Public Security, signaling a direct connection to government oversight. Meanwhile, most defendants are linked to a private company called i-Soon. This company specializes in hacking services, revealing how state and corporate interests can blur the lines in cyberspace.

    Additionally, the methods and motivations of these hackers deserve attention. They allegedly profited handsomely by targeting American infrastructure and stealing sensitive data. Reports state they charged varying fees for stolen data, reflecting an alarming monetization of cyber offensives. Such practices not only threaten national security but also raise significant ethical questions about accountability and the private sector’s role in cyber warfare.

    Moreover, the hackers’ victims include a wide range of organizations, from local governments to healthcare systems. This extensive targeting amplifies the potential impact of such breaches, as they extend far beyond financial losses. Consequently, these attacks could endanger personal privacy, public safety, and even national security.

    The DOJ’s response illustrates a proactive stance against these threats. The U.S. government has placed a sizable bounty for information leading to the identification and arrest of these criminals, emphasizing the urgency of addressing cybercrime. However, the absence of arrests raises questions about the effectiveness of international law in capturing cybercriminals, especially those operating under state protection.

    Addressing these issues requires coordinated efforts from governments and organizations worldwide. As cyber threats evolve, so too must our strategies for combat. Education and awareness in cybersecurity will play crucial roles in protecting sensitive data. Therefore, pursuing better policies and fostering international cooperation remains necessary to counteract these sophisticated threats. Understanding the landscape of cyber warfare is crucial for maintaining security and stability in today’s interconnected world.

    Expand Your Tech Knowledge

    Explore the future of technology with our detailed insights on Artificial Intelligence.

    Explore past and present digital transformations on the Internet Archive.

    TechV1

    Innovation Management Tech technology VT1
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCheers to the Chef: Researching Kitchen Robots
    Next Article Cardano Jumps 20%: Is $5 Next as BTCBULL Presale Surges?
    Avatar photo
    Lina Johnson Mercilli
    • Website

    Lina Johnson Marcelli is the editor for IO Tribune, bringing over two decades of experience in journalism to her role. With a BA in Journalism, she is passionate about delivering impactful stories that resonate with readers. Known for her keen editorial vision and leadership, Lina is dedicated to fostering innovative storytelling across the publication. Outside of work, she enjoys exploring new media trends and mentoring aspiring journalists.

    Related Posts

    Space

    Guardians of the Skies: Ensuring X-59’s Soaring Safety

    January 20, 2026
    Crypto

    Bitcoin’s Fear & Greed Index Hits Golden Cross!

    January 20, 2026
    Tech

    UK Considers Social Media Ban for Under-16s: What’s at Stake?

    January 20, 2026
    Add A Comment

    Comments are closed.

    Must Read

    Guardians of the Skies: Ensuring X-59’s Soaring Safety

    January 20, 2026

    Bitcoin’s Fear & Greed Index Hits Golden Cross!

    January 20, 2026

    UK Considers Social Media Ban for Under-16s: What’s at Stake?

    January 20, 2026

    Unlock Disney+ and Hulu for Just $10 This Month!

    January 20, 2026

    Unlock 3 Months for Just $3!

    January 20, 2026
    Categories
    • AI
    • Crypto
    • Fashion Tech
    • Gadgets
    • IOT
    • OPED
    • Quantum
    • Science
    • Smart Cities
    • Space
    • Tech
    • Technology
    Most Popular

    Last Chance: Unlock Early Bird Savings for Disrupt 2025!

    May 21, 2025

    Dramatic Drone Collision: Amazon Prime Air Drones Crash in Arizona

    October 2, 2025

    Binance Under Fire for Weak Response to Upbit Hack, Freezing Just 17% of Assets

    December 12, 2025
    Our Picks

    Dusk and Cordial Launch Zero-Trust Custody for RWA Assets at NPEX

    February 27, 2025

    The Social Intelligence of Machines: Are AIs Becoming Our New Neighbors?

    July 11, 2025

    Quantum Chaos: Celebrating a Century of Mind-Bending Theory

    August 10, 2025
    Categories
    • AI
    • Crypto
    • Fashion Tech
    • Gadgets
    • IOT
    • OPED
    • Quantum
    • Science
    • Smart Cities
    • Space
    • Tech
    • Technology
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About Us
    • Contact us
    Copyright © 2025 Iotribune.comAll Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.