Cyber analysts have reportedly discovered a strange cyberwarfare trend. According to a report by New York Times, quoting security researchers, since the beginning of the war in Ukraine, groups linked to the Chinese government have repeatedly hacked Russian companies and government agencies in an apparent search for military secrets. There has been increase in Since Russia’s invasion of Ukraine in February 2022, Chinese government-linked hackers have repeatedly targeted Russian companies and government agencies, seeking military secrets, according to the New York Times report.
The cyberattacks, which intensified in May 2022, have persisted despite public declarations of a “no-limits” partnership between Russian President Vladimir Putin and Chinese President Xi Jinping.
Chinese hacking groups 'targetting' Russian businesses
The report claims that a Chinese hacking group, Sanyo, impersonated a Russian engineering firm’s email addresses in 2023 to steal data on nuclear submarines, as uncovered by Taiwan-based cybersecurity firm TeamT5, which linked the attack to Beijing. “China likely seeks to gather intelligence on Russia’s activities, including on its military operation in Ukraine, defense developments and other geopolitical maneuvers,” TeamT5 researcher Che Chang told the Times.
A classified Russian FSB document, obtained by The New York Times, reveals Moscow’s concerns about China’s pursuit of Russian defense technology and battlefield insights, labeling China an “enemy.” This contrasts with the public Sino-Russian alliance, as Russia relies on China for oil markets and war-critical technology. The document highlights China’s interest in drone warfare and software, noting that “the war in Ukraine fundamentally shifted intelligence priorities for both countries,” according to Itay Cohen of Palo Alto Networks, as quoted by the Times.
What techniques Chinese hackers are said to be using against Russia
The New York Times also reports that Chinese hackers targeted Rostec, Russia’s state-owned defense conglomerate, for satellite communications and radar data, using malicious Microsoft Word files to infiltrate aviation and state entities. Groups like Mustang Panda, suspected of ties to China’s Ministry of State Security, have hit Russian military and border units, the Times notes, citing Rafe Pilling of Sophos. Pilling told the Times, “The targeting we’ve observed tends to be political and military intelligence gathering.”
Proprietary malware like Deed RAT, used by Chinese state-sponsored hackers, has been deployed against Russian aerospace and defense sectors, the report said, citing Positive Technologies. Despite 2009 and 2015 agreements barring mutual cyberattacks, the Times notes that experts view these as symbolic, with hacking spiking post-Ukraine invasion. “The activity — we saw it immediately in the months following Russia’s full-scale invasion,” Cohen told the Times, highlighting the tension beneath the public narrative of Sino-Russian unity.
The cyberattacks, which intensified in May 2022, have persisted despite public declarations of a “no-limits” partnership between Russian President Vladimir Putin and Chinese President Xi Jinping.
Chinese hacking groups 'targetting' Russian businesses
The report claims that a Chinese hacking group, Sanyo, impersonated a Russian engineering firm’s email addresses in 2023 to steal data on nuclear submarines, as uncovered by Taiwan-based cybersecurity firm TeamT5, which linked the attack to Beijing. “China likely seeks to gather intelligence on Russia’s activities, including on its military operation in Ukraine, defense developments and other geopolitical maneuvers,” TeamT5 researcher Che Chang told the Times.
A classified Russian FSB document, obtained by The New York Times, reveals Moscow’s concerns about China’s pursuit of Russian defense technology and battlefield insights, labeling China an “enemy.” This contrasts with the public Sino-Russian alliance, as Russia relies on China for oil markets and war-critical technology. The document highlights China’s interest in drone warfare and software, noting that “the war in Ukraine fundamentally shifted intelligence priorities for both countries,” according to Itay Cohen of Palo Alto Networks, as quoted by the Times.
What techniques Chinese hackers are said to be using against Russia
The New York Times also reports that Chinese hackers targeted Rostec, Russia’s state-owned defense conglomerate, for satellite communications and radar data, using malicious Microsoft Word files to infiltrate aviation and state entities. Groups like Mustang Panda, suspected of ties to China’s Ministry of State Security, have hit Russian military and border units, the Times notes, citing Rafe Pilling of Sophos. Pilling told the Times, “The targeting we’ve observed tends to be political and military intelligence gathering.”
Proprietary malware like Deed RAT, used by Chinese state-sponsored hackers, has been deployed against Russian aerospace and defense sectors, the report said, citing Positive Technologies. Despite 2009 and 2015 agreements barring mutual cyberattacks, the Times notes that experts view these as symbolic, with hacking spiking post-Ukraine invasion. “The activity — we saw it immediately in the months following Russia’s full-scale invasion,” Cohen told the Times, highlighting the tension beneath the public narrative of Sino-Russian unity.
You may also like
Nicola Peltz Beckham's pals say 'attacks' and 'false claims' getting out of hand
Stephen Mulhern confirms he's been dropped by Butlin's in latest blow
Brazil hot air balloon tragedy pilot reveals how 13 survived inferno that killed 8
Miley Cyrus shares insights into her relationship with Maxx Morando
Harry Kane gives take on major England fear ahead of 2026 World Cup