Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Chinese National Admits Hacking US Defense Firms

A Chinese national pleaded guilty Wednesday on charges stemming from the hacking of trade secrets from US defense contractors, including plans for transport and fighter jets, officials said.

A Chinese national pleaded guilty Wednesday on charges stemming from the hacking of trade secrets from US defense contractors, including plans for transport and fighter jets, officials said.

Su Bin, 50, had been charged in a 2014 indictment with hacking into the computer networks of Boeing and other contractors, as part of a scheme to steal plans for the F-22 and F-35 fighter jets and C-17 transport aircraft.

In a plea agreement filed in a California federal court, Su admitted to conspiring with two unnamed persons in China from October 2008 to March 2014 to gain unauthorized access to computer networks of defense firms to obtain “sensitive military information and to export that information illegally from the United States to China,” the Justice Department said in a statement.

Court documents did not indicate to whom Su was sending the plans, but the case highlighted growing concerns in the United States about Chinese hacking of American trade secrets, a topic which has been addressed by President Barack Obama and his counterpart Xi Jinping.

“Su Bin admitted to playing an important role in a conspiracy, originating in China, to illegally access sensitive military data, including data relating to military aircraft that are indispensable in keeping our military personnel safe,” said Assistant Attorney General John Carlin.

“This plea sends a strong message that stealing from the United States and our companies has a significant cost; we can and will find these criminals and bring them to justice.”

Arrested in Canada

Su was initially arrested in Canada in July 2014 on a warrant based on a US request. He waived extradition and was sent to the United States in February 2016.

Su Bin, also known as Stephen Su and Stephen Subin, was a China-based businessman in the aviation and aerospace fields.

According to prosecutors, Su would e-mail the co-conspirators pictures and other documents, with guidance regarding what persons, companies and technologies to target for hacking.

After the data was stolen, Su translated the information from English into Chinese.

Su and his co-conspirators each wrote, revised and emailed reports about the information and technology they had acquired “to the final beneficiaries of their hacking activities,” the Justice Department said.

Sentencing was set for July 13. Su faces a maximum penalty of five years in prison and a fine of $250,000 or twice the gross gain from the offense.

Last September, Obama and Xi addressed the issue of cybertheft at their Washington meeting, and both leaders agreed it was unacceptable.

Obama said after the talks that “we’ve agreed that neither the US or the Chinese government will conduct or knowingly support cyber-enabled theft of intellectual property.”

Xi said “China strongly opposes and combats the theft of commercial secrets and other kinds of hacking attacks.”

Analysts have been cautious, warning that it remained to be seen if Beijing would live up to its agreement to crack down on hacking.

One report by a cybersecurity firm said hackers linked to the Chinese government kept up efforts to break into US computer networks shortly after the cybersecurity agreement.

Related: Chinese Soldiers Linked to US Military Hacking Case

Written By

AFP 2023

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Cybercrime

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...