FBI Issues “Most Wanted” Notice For Wang “Ugly Gorilla” Dong And 4 Other Chinese Army Officers

Presented with no comment… From Gu “KandyGoo” Chunhui to Wang “Ugly Gorilla” Dong… here are the FBI’s current Public Cyber Enemies #1 through 5.

 

 

  • Wen Xinyu: Alias – “WinXYHappy”, “Win_XY”, Lao Wen – Wen controlled victim computers.
  • Sun Kailiang: Alias – Jack Sun –  held the rank of captain during the early stages of the investigation, was observed both sending malicious e-mails and controlling victim computers.
  • Huang Zhenyu: Alias – “Hzy_lhx” – Huang was a computer programmer who managed the domain accounts used by the others.
  • Wang Dong: Alias – Jack Wang, “Ugly Gorilla” – Wang controlled victim computers.
  • Gu Chunhui: Alias – “KandyGoo” – Gu tested malicious e-mail messages and also managed the domain accounts used by the others.

On May 1, 2014, a grand jury in the Western District of Pennsylvania indicted five members of the People’s Liberation Army (PLA) of the People’s Republic of China (PRC) for 31 criminal counts, including: conspiring to commit computer fraud; accessing a computer without authorization for the purpose of commercial advantage and private financial gain; damaging computers through the transmission of code and commands; aggravated identity theft; economic espionage; and theft of trade secrets.

The subjects were officers of the PRC’s Third Department of the General Staff Department of the People’s Liberation Army (3PLA), Second Bureau, Third Office, Military Unit Cover Designator (MUCD) 61398, at some point during the investigation. The activities executed by each of these individuals allegedly involved in the conspiracy varied according to his specialties. Each provided his individual expertise to an alleged conspiracy to penetrate the computer networks of six American companies while those companies were engaged in negotiations or joint ventures or were pursuing legal action with, or against, state-owned enterprises in China. They then used their illegal access to allegedly steal proprietary information including, for instance, e-mail exchanges among company employees and trade secrets related to technical specifications for nuclear plant designs.

Source: FBI




via Zero Hedge http://ift.tt/1o7nqPn Tyler Durden

Leave a Reply

Your email address will not be published. Required fields are marked *