Justice Department Charges Chinese Hackers-for-Hire Linked to Treasury Breach

The Department of Justice has taken significant steps against a group of Chinese government-linked hackers who have been accused of orchestrating a decade-long campaign of cyber attacks on over 100 American organizations, including the U.S. Treasury.

Twelve individuals have been charged with various crimes related to their involvement in this hacking operation, which is believed to have begun as far back as 2010.

The charged hackers-for-hire are accused of targeting a wide range of organizations, from small businesses and non-profits to major corporations and government agencies. Their malicious activities were designed to compromise sensitive data, disrupt operations, and gain unauthorized access to systems.

At the epicenter of this hacking operation was the Chinese Ministry of State Security (MSS), which is believed to be one of China's primary intelligence gathering arms. The MSS has been accused of using these hackers-for-hire as a tool for espionage and sabotage.

The Treasury Department was one of several organizations targeted by the hackers, who were able to gain access to sensitive financial information and compromise systems used to manage government funds.

According to the Department of Justice, the charged individuals played a "key role" in China's efforts to infiltrate and exploit American systems for their own nation's interests. Their actions are believed to have had significant consequences for national security and economic stability.

The charging announcement was made by the U.S. Attorney General, who emphasized the severity of these allegations and the need for the United States to hold Chinese government officials accountable for their role in these hacking operations.

The Department of Justice has also announced plans to seize assets linked to the hackers-for-hire, including bank accounts, real estate properties, and other financial instruments. This move is seen as an effort to disrupt the financial networks used by these cyber attackers and make it more difficult for them to carry out future operations.