Get the Global IP Investigations and Enforcement Perspective

Industry content delivered straight to your inbox.
Email address
Secure and Spam free...

New and Improved: Hybrid Chinese IP Theft Model

There’s a subplot to my previous post, “Arsenal Employed by Chinese State IP Thieves Have no Moral Limits,” about the four Chinese State IP thieves recently indicted who conspired with Chinese universities to steal.

The criminals also used a different model. A more expansive model. A model that appears to mimic what the Russians have been doing for some time.

Here’s a quote from a recent New York Times article titled, “Spies for Hire: China’s New Breed of Hackers Blends Espionage and Entrepreneurship,”

“This new group of hackers has made China’s state cyberspying machine stronger, more sophisticated and — for its growing array of government and private-sector targets — more dangerously unpredictable. Sponsored but not necessarily micromanaged by Beijing, this new breed of hacker attacks government targets and private companies alike, mixing traditional espionage with outright fraud and other crimes for profit.

The “new and improved” Chinese hybrid IP theft model does not just rely on the Ministry of State Security (MSS) or People’s Liberation Army (PLA) hackers. The Chinese have now embraced freelance hackers to supplement their military or state security IP theft operations..

As we know, it has embarrassed Beijing over the years when the U.S. has connected various hacks directly with their MSS or PLA.

And like the Russians, the freelance hackers are free to torment any other targets they like, as long as they do not target victims in their own countries.

The new model gives the Chinese, as it does for the Russians, plausible deniability.

Here’s another quote from the New York Times Article:

“Under this system, Chinese hackers have become increasingly aggressive. The rate of global attacks linked to the Chinese government has nearly tripled since last year compared with the four previous years, according to Recorded Future, a Somerville, Mass., company that studies the use of internet by state-linked actors. That number now averages more than 1,000 per three-month period, it said.”

And that should alarm us not just because of the exponential increase of Chinese state-sponsored hacks, but because victims must now confront hackers that—not just steal for the benefit of the Chinese government—but now must sometimes navigate Chinese hackers who will then extort them to line their own pockets.

A few other New York Times quotes:

“A grand jury indictment released last year charged that two former classmates from an electrical engineering college in Chengdu, in southwest China, marauded through foreign computer servers and stole information from dissidents and engineering diagrams from an Australian defense contractor.

On the side, the indictment said, the two tried extortion: demanding payment in return for not revealing an unidentified company’s source code on the internet.”

“… ‘said Robert Potter, the head of Internet 2.0, an Australian cybersecurity firm. “I’ve seen them do some really boneheaded things, like try and steal $70,000 during an espionage op.’”

FINAL THOUGHT

Boneheaded, maybe. But it sure makes it tougher for victims to navigate.

DisclaimerIPProbe.Global is a service to the professional IP community. While every effort has been made to check information in this blog, we provide no guarantees or warranties, express or implied, regarding the content provided in IPProbe.Global. We disclaim all liability and responsibility for the qualification or accuracy of representations made by the contributors or for any disputes that may arise. It is the responsibility of the readers to independently investigate and verify the credentials of such persons and the accuracy and validity of the information provided by them. This blog is for general information only and not intended to provide legal or other professional advice.

Did you find this post useful?
I agree to have my personal information transfered to MailChimp ( more information )
Join other IP protection professionals, i.e., investigators, attorneys, and brand protection specialists and receive updates straight to your inbox.
We hate spam. Your email address will not be sold or shared with anyone else.

Ron Alvarez is an IP investigations and protection consultant and writer in New York City. He is a former NYPD lieutenant where he investigated robbery, narcotics, internal affairs, and fine art theft cases. Ron has since coordinated the private investigation of international fraud and money laundering cases, as well as IP-related investigations and research involving the four pillars of IP: copyright, patents, trademarks, and trade secrets. Ron is a graduate of the FBI National Academy and earned a B.A. in Government and Public Administration from John Jay College of Criminal Justice in Manhattan. He has written a number of articles for various investigative publications, as well as published "The World of Intellectual Property (IP) Protection and Investigations" in November 2021.

1 comment on “New and Improved: Hybrid Chinese IP Theft Model

  1. THOMAS MANLEY

    THANK YOU RONALD
    Looks like cybercrime will be with us in ever escalating dimensions
    Somehow, someway the engineers must create fool proof security strategies that work
    Good Work
    Sincerely
    Tom

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Get the Global IP Investigations and Enforcement Perspective

Industry content delivered straight to your inbox.
Email address
Secure and Spam free...
%d bloggers like this: