Who is Dong Jiazhi (Chinese Hacker Steal document) Wiki, Biography, Age Unknown FACTS YOU NEED TO KNOW

Dong Jiazhi Wiki – Dong Jiazhi Biography

U.S. prosecutors have charged two Chinese nationals, alleges Li Xiaoyu, 34, and Dong Jiazhi, 33, stole terabytes of data from high-technology companies, around the world

Why Dong Jiazhi and Dong Jiazhi Arrested

US prosecutors charged two Chinese nationals who are said to be working for the Chinese government intelligence bureau for alleged involvement in a major global hacking operation that has targeted hundreds of companies and governments for more than a decade.
Prosecutors claimed that the 11-count indictment, which was not sealed on Tuesday, 34-year-old Li Xiaoyu and 33-year-old Dong Jiazhi stole terabytes of data from high-tech companies around the world, including the United States.

Dong Jiazhi Accused for Hacking Network

More recently, prosecutors accused hackers of targeting networks of more than a dozen US companies in Maryland, Massachusetts, and California, and developed vaccines and treatments for COVID-19.
The indictment came just weeks after both the FBI and Homeland Security warned that it was actively trying to steal US research data on China’s coronavirus pandemic.

What Justice department of US said about Dong Jiazhi

The Justice Department said hackers were first discovered after targeting the US Department of Energy network in Hanford, Washington. Hackers also targeted companies in Australia, South Korea, and several European countries.

Hackers used known but unpaired vulnerabilities in web server software, which is commonly used to enter victims’ networks. Hackers gained a foothold on the network, installing password-stealing software to gain deeper access to their systems. Prosecutors said hackers would “frequently” return to networks in some cases years later.

Dong Jiazhi is one of hacker and how many dollars have been stolen by Hackers?

According to the indictment, hackers stole “hundreds of millions of dollars” of trade secrets and intellectual property. Prosecutors also claim hackers steal data about military satellite programs, military wireless networks, and high-powered microwave and laser systems from defense contractors.
It is said that hackers target their victims on behalf of China’s intelligence services, but are hacked for personal financial gain. Prosecutors said in a case that hackers were “trying to force crypto money” from a victim company, threatening to publish the victim’s stolen source code online.
John C. Demers, the US deputy chief of national security, said the indictments are “concrete examples” of how China uses hackers to “rob, multiply, and replace” non-Chinese companies in the global market.

Demers also accused China of providing a safe haven for hackers.

“China has now taken its place in the club of shameful nations, which, together with Russia, Iran and North Korea, provides a safe haven for cybercriminals in exchange for ‘calling’ the cybercriminals to work for the benefit of the state. “To nurture the Chinese Communist party’s insatiable hunger for hard-earned intellectual property, including the US and other non-Chinese companies’ COVID-19 research.”

Mandiant, the security intervention department of security firm FireEye, said that it has been monitoring hackers since 2013 and is “consistent” with the findings of the tactics, techniques and procedures used by hackers.

“The Chinese government has long been relying on contractors to carry out cyber attacks,” said Ben Read, Mandiant analyst senior manager, Read. “The use of these freelancers allows the government to access a wider range of talents while at the same time providing some deniability when conducting these operations.”

“The pattern announced in the indictment that contractors are conducting some operations on behalf of state sponsors, others were for their own profits, consistent with what we saw from other Sino-nexus groups like APT41,” he said. In connection with the indictment, China developed permanent threat group.

If judged, each hacker could be sentenced to more than 40 years in prison. However, since hackers are still believed to be in China, we think it is unlikely to be returned to the United States.