China hacker opens window into cyber-espionage

BEIJING — For a 25-year-old computer whiz enlisted in a People’s Liberation Army hacking unit, life was all about low pay, drudgery and social isolation.

Nothing at all like the unkempt hackers of popular imagination, the young man wore a military uniform at work in Shanghai. He lived in a dorm where meals often consisted of instant ramen noodles. The workday ran from 8 a.m. to 5:30 p.m., although hackers were often required to work late into the evening.

With no money and little free time, he found solace on the Internet. He shopped, chatted with friends and courted a girlfriend. He watched movie and television shows. He drew particular inspiration from the Fox series “Prison Break,” and borrowed its name for his blog.

The blog provides a rare peek into the secretive hacking establishment of the Chinese military, which employs thousands of people in what is believed to be by far the world’s largest institutionalized hacking operation.

Concern about computer security has risen sharply in recent weeks. Top U.S. intelligence officials said Tuesday that attacks and espionage now pose a greater potential danger than al-Qaida and other militant organizations. The computers of more than 30 journalists and executives of Western news organizations in China, including The New York Times and The Wall Street Journal, have been hacked.

Mandiant Corp., a U.S. computer security compamy based in Alexandria, Va., said in a report last month that it had traced an epidemic of attacks on dozens of U.S. and Canadian companies to an office building in Shanghai occupied by an espionage unit of the People’s Liberation Army.

Richard Bejtlich, Mandiant’s security chief, said posts written by the blogger, who called himself “Rocy Bird,” provided the most detailed first-person account known to date of life inside the hacking establishment. Although the blog was discontinued four years ago, the techniques described in it remain the same. “It is relevant,” said Bejtlich. “Things have not changed that much.”

The hacker, whose real family name is Wang, posted 625 entries between 2006 and 2009. “Fate has made me feel that I am imprisoned,” he wrote in his first entry on Sina.com. “I want to escape.”

Los Angeles Times reporters tracked down Wang and his blog through an e-mail address that was listed on a published 2006 paper about hacking. A coauthor of the paper was Mei Qiang, identified by Mandiant as a key hacker who operated under the alias “Super Hard” in Unit 61398.

One of many Chinese military units linked to hacking, Unit 61398 falls under the People’s Liberation Army’s General Staff 3rd Department, 2nd Bureau, which is roughly equivalent to the U.S. National Security Agency.

The PLA recruits computer scientists, mathematicians and linguists from China’s top universities for its Internet espionage programs. Not unlike in the U.S., students can continue their education for free in return for their enlistment in military service.

Wang earned his master’s degree in Internet security at age 25 at the Information Engineering University, run by the PLA in Zhengzhou, Henan province.

Immediately after graduating in 2006, he was enlisted in a hacking operation in Shanghai.

In the blog, Wang did not disclose which unit he worked for, but he made it clear that he was wearing a uniform and carrying a military badge. He described his building as being far from the Shanghai city center, one of his many complaints.

“What I can’t understand is why all the work units are located in the most remote areas of the city,” Wang wrote in an entry in 2007. “I really don’t get what those old guys are thinking in the beginning. They should at least take us young people into consideration. How can passionate young people like us handle a prison-like environment like this?”

One of his first tasks was to improve on a Trojan virus known as Back Orifice 2000, which is designed to remotely hijack a computer system to steal information.

In July 2007, he boasted that his virus had successfully escaped detection by three leading detection programs made by McAfee, Symantec and Trend Micro, but that it didn’t get past a fourth, Kaspersky. He also described another assignment: write a virus that would detect any USB storage device attached to a computer and copy its files. The virus was a success and Wang’s boss was pleased.

“If we’re lucky enough, we might be able to complete this year’s target and earn a year-end bonus for everyone,” Wang wrote with enthusiasm.

Otherwise, Wang poured out his unhappiness. The hackers were required to speak English, the international language of technology, as well as an essential for phishing attacks on mostly U.S. targets. But when Wang tried to hone his English skills by reading magazines such as the Economist and Harvard Business Review, his boss rebuked him for reading too much foreign press.

“The boss doesn’t understand. I’ll have to be more careful,” he complained. Wang was also unhappy that supervisors refused to reimburse him for a $1 bus ticket to attend a business conference, while his boss claimed more than $100 for a bottle of liquor.

A high school reunion left Wang feeling discouraged about his paycheck and prospects.

“They all have a bright future. Some of them became lawyers; some went into property business or finance; some wrote programs for a commercial software company. Compared with their handsome monthly income, I even felt ashamed to say hello to them,” Wang wrote.

Wang never reflected on the pros and cons of hacking for the Chinese government, but he clearly regretted having enlisted. “My only mistake was that I sold myself out to the country for some minor benefits and put myself in this embarrassing situation,” he wrote. With the help of his family, he managed to get out in 2008. He stopped writing the blog a year later.

Wang is believed to be living in Chengdu. One of his last online traces was a comment posted on Dianping, a popular restaurant review site, about an ice cream parlor in that city.

Wang did not return several e-mails and instant messages requesting comment.

The period covered in Wang’s blog coincides with an upsurge in hacking detected by Mandiant. In a report issued last month, the company said hackers had systematically stolen hundreds of terabytes from 141 organizations, most of them American.

Industries targeted included chemicals, technology, financial services, mining, energy, health care, media and international organizations. The data included blueprints, pricing strategies and e-mails, which are suspected of being given to Chinese state-owned enterprises for competitive advantage.

The Chinese government has repeatedly denied hacking and has said it has been the victim of attacks originating from the United States.

“Cyberspace needs rules and cooperation, not war. China is willing to have constructive dialogue and cooperation with the global community, including the United States,” Foreign Ministry spokeswoman Hua Chunying said at a briefing Tuesday.

Last month’s report by Mandiant marked the first time individual hackers were identified by name. More information has trickled out since.

Investigators have unearthed birthdays, photographs, profiles on Kaixin (a Chinese version of Facebook), shopping and dining preferences. One hacker’s user name appeared in a forum for flower-arranging enthusiasts.

They logged on to personal e-mail or social networking sites from work, or used their real phone numbers to register Gmail or Hotmail accounts later used for phishing attacks. Mei Qiang, Wang’s research partner, posted a note on a software developer’s message board looking for extra work.

“I’m good at writing hacking tools, such as Trojan viruses,” read the advertisement posted in 2005. It was taken down last month after it was discovered by an investigator based in India who runs a blog called Cyb3rSleuth.

“These were not elite uber-hackers,” said Richard Mogull, an Internet security consultant and head of the Phoenix-based Securosis. “Some people want to demonize these guys, but they are just frontline soldiers doing their job for their country – not evil people.”

Wang probably never imagined his blog would catch the focus of journalists or Internet security experts, Bejtlich said. “This is really an anguished person who didn’t enjoy his situation, and this is probably just an outlet for him to share his story,” he said.

Because the hackers were operating under military protection, they probably weren’t as intent on concealing their identities as criminals who would face punishment if caught. Bejtlich compared them to members of the U.S. military who inadvertently make disclosures on Facebook or on blogs. “They will get better. That’s how they will learn.”

Talk to us

> Give us your news tips.

> Send us a letter to the editor.

> More Herald contact information.

More in Local News

Ariel Garcia, 4, was last seen Wednesday morning in an apartment in the 4800 block of Vesper Dr. (Photo provided by Everett Police)
How to donate to the family of Ariel Garcia

Everett police believe the boy’s mother, Janet Garcia, stabbed him repeatedly and left his body in Pierce County.

A ribbon is cut during the Orange Line kick off event at the Lynnwood Transit Center on Saturday, March 30, 2024 in Lynnwood, Washington. (Annie Barker / The Herald)
‘A huge year for transit’: Swift Orange Line begins in Lynnwood

Elected officials, community members celebrate Snohomish County’s newest bus rapid transit line.

Bethany Teed, a certified peer counselor with Sunrise Services and experienced hairstylist, cuts the hair of Eli LeFevre during a resource fair at the Carnegie Resource Center on Wednesday, March 6, 2024, in downtown Everett, Washington. (Ryan Berry / The Herald)
Carnegie center is a one-stop shop for housing, work, health — and hope

The resource center in downtown Everett connects people to more than 50 social service programs.

Everett mall renderings from Brixton Capital. (Photo provided by the City of Everett)
Topgolf at the Everett Mall? Mayor’s hint still unconfirmed

After Cassie Franklin’s annual address, rumors circled about what “top” entertainment tenant could be landing at Everett Mall.

Snohomish City Hall on Friday, April 12, 2024 in Snohomish, Washington. (Olivia Vanni / The Herald)
Snohomish may sell off old City Hall, water treatment plant, more

That’s because, as soon as 2027, Snohomish City Hall and the police and public works departments could move to a brand-new campus.

Lewis the cat weaves his way through a row of participants during Kitten Yoga at the Everett Animal Shelter on Saturday, April 13, 2024, in Everett, Washington. (Ryan Berry / The Herald)
Downward cat? At kitten yoga in Everett, it’s all paw-sitive vibes

It wasn’t a stretch for furry felines to distract participants. Some cats left with new families — including a reporter.

FILE - In this Friday, March 31, 2017, file photo, Boeing employees walk the new Boeing 787-10 Dreamliner down towards the delivery ramp area at the company's facility in South Carolina after conducting its first test flight at Charleston International Airport in North Charleston, S.C. Federal safety officials aren't ready to give back authority for approving new planes to Boeing when it comes to the large 787 jet, which Boeing calls the Dreamliner, Tuesday, Feb. 15, 2022. The plane has been plagued by production flaws for more than a year.(AP Photo/Mic Smith, File)
Boeing pushes back on Everett whistleblower’s allegations

Two Boeing engineering executives on Monday described in detail how panels are fitted together, particularly on the 787 Dreamliner.

Ferry workers wait for cars to start loading onto the M/V Kitsap on Friday, Dec. 1, 2023 in Mukilteo, Washington. (Olivia Vanni / The Herald)
Struggling state ferry system finds its way into WA governor’s race

Bob Ferguson backs new diesel ferries if it means getting boats sooner. Dave Reichert said he took the idea from Republicans.

Traffic camera footage shows a crash on northbound I-5 near Arlington that closed all lanes of the highway Monday afternoon. (Washington State Department of Transportation)
Woman dies almost 2 weeks after wrong-way I-5 crash near Arlington

On April 1, Jason Lee was driving south on northbound I-5 near the Stillaguamish River bridge when he crashed into a car. Sharon Heeringa later died.

Owner Fatou Dibba prepares food at the African Heritage Restaurant on Saturday, April 6, 2024 in Everett, Washington. (Annie Barker / The Herald)
Oxtail stew and fufu: Heritage African Restaurant in Everett dishes it up

“Most of the people who walk in through the door don’t know our food,” said Fatou Dibba, co-owner of the new restaurant at Hewitt and Broadway.

A pig and her piglets munch on some leftover food from the Darrington School District’s cafeteria at the Guerzan homestead on Friday, March 15, 2024, in Darrington, Washington. Eileen Guerzan, a special education teacher with the district, frequently brings home food scraps from the cafeteria to feed to her pigs, chickens and goats. (Ryan Berry / The Herald)
‘A slopportunity’: Darrington school calls in pigs to reduce food waste

Washingtonians waste over 1 million tons of food every year. Darrington found a win-win way to divert scraps from landfills.

Foamy brown water, emanating a smell similar to sewage, runs along the property line of Lisa Jansson’s home after spilling off from the DTG Enterprises property on Tuesday, March 5, 2024, in Snohomish, Washington. Jansson said the water in the small stream had been flowing clean and clear only a few weeks earlier. (Ryan Berry / The Herald)
Neighbors of Maltby recycling facility assert polluted runoff, noise

For years, the DTG facility has operated without proper permits. Residents feel a heavy burden as “watchdogs” holding the company accountable.

Support local journalism

If you value local news, make a gift now to support the trusted journalism you get in The Daily Herald. Donations processed in this system are not tax deductible.