Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Chinese National Admits Hacking US Defense Firms

A Chinese national pleaded guilty Wednesday on charges stemming from the hacking of trade secrets from US defense contractors, including plans for transport and fighter jets, officials said.

A Chinese national pleaded guilty Wednesday on charges stemming from the hacking of trade secrets from US defense contractors, including plans for transport and fighter jets, officials said.

Su Bin, 50, had been charged in a 2014 indictment with hacking into the computer networks of Boeing and other contractors, as part of a scheme to steal plans for the F-22 and F-35 fighter jets and C-17 transport aircraft.

In a plea agreement filed in a California federal court, Su admitted to conspiring with two unnamed persons in China from October 2008 to March 2014 to gain unauthorized access to computer networks of defense firms to obtain “sensitive military information and to export that information illegally from the United States to China,” the Justice Department said in a statement.

Court documents did not indicate to whom Su was sending the plans, but the case highlighted growing concerns in the United States about Chinese hacking of American trade secrets, a topic which has been addressed by President Barack Obama and his counterpart Xi Jinping.

“Su Bin admitted to playing an important role in a conspiracy, originating in China, to illegally access sensitive military data, including data relating to military aircraft that are indispensable in keeping our military personnel safe,” said Assistant Attorney General John Carlin.

“This plea sends a strong message that stealing from the United States and our companies has a significant cost; we can and will find these criminals and bring them to justice.”

Arrested in Canada

Su was initially arrested in Canada in July 2014 on a warrant based on a US request. He waived extradition and was sent to the United States in February 2016.

Advertisement. Scroll to continue reading.

Su Bin, also known as Stephen Su and Stephen Subin, was a China-based businessman in the aviation and aerospace fields.

According to prosecutors, Su would e-mail the co-conspirators pictures and other documents, with guidance regarding what persons, companies and technologies to target for hacking.

After the data was stolen, Su translated the information from English into Chinese.

Su and his co-conspirators each wrote, revised and emailed reports about the information and technology they had acquired “to the final beneficiaries of their hacking activities,” the Justice Department said.

Sentencing was set for July 13. Su faces a maximum penalty of five years in prison and a fine of $250,000 or twice the gross gain from the offense.

Last September, Obama and Xi addressed the issue of cybertheft at their Washington meeting, and both leaders agreed it was unacceptable.

Obama said after the talks that “we’ve agreed that neither the US or the Chinese government will conduct or knowingly support cyber-enabled theft of intellectual property.”

Xi said “China strongly opposes and combats the theft of commercial secrets and other kinds of hacking attacks.”

Analysts have been cautious, warning that it remained to be seen if Beijing would live up to its agreement to crack down on hacking.

One report by a cybersecurity firm said hackers linked to the Chinese government kept up efforts to break into US computer networks shortly after the cybersecurity agreement.

Related: Chinese Soldiers Linked to US Military Hacking Case

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.