{
	"id": "c1e91785-8733-4600-a6cf-49a595f39929",
	"created_at": "2026-04-06T01:29:30.293548Z",
	"updated_at": "2026-04-10T03:35:46.100372Z",
	"deleted_at": null,
	"sha1_hash": "cf95a4bc9861b5bdb96b20f45b56effd42931a2f",
	"title": "China Protests US Sanctions for Its Alleged Role in Hacking, Complains of Foreign Hacker Attacks",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 98635,
	"plain_text": "China Protests US Sanctions for Its Alleged Role in Hacking,\r\nComplains of Foreign Hacker Attacks\r\nBy Associated Press\r\nPublished: 2025-01-07 · Archived: 2026-04-06 00:39:36 UTC\r\nChina has slammed a decision by the U.S. Treasury to sanction a Beijing-based cybersecurity company for\r\nits alleged role in multiple hacking incidents targeting critical U.S. infrastructure, while the Chinese cyber\r\nsecurity agency complained Monday of attacks on Chinese networks.\r\nAsked about the sanctions against Beijing-based Integrity Technology Group, Chinese Foreign Ministry\r\nspokesperson Guo Jiakun said the country has cracked down on cyber attacks and that Washington was using the\r\nissue to “defame and smear China.”\r\n“For some time now, the U.S. side has been playing up so-called Chinese cyber attacks and has even initiated\r\nillegal unilateral sanctions against China,” Guo said. “China firmly opposes this and will take necessary measures\r\nto safeguard its legitimate rights and interests.”\r\nIntegrity Technology Group said the move by Washington had “no factual basis.”\r\n“The company firmly opposes the U.S. Treasury Department’s unwarranted accusations and Illegal unilateral\r\nsanctions on the company,” the company, also known as Yongxin Zhicheng Technology Group, said in a statement\r\nMonday to the Shanghai Stock Exchange.\r\nThe China National Cyber Security Information Center said it had discovered attacks from various malicious\r\nwebsites and foreign IP addresses, including some in California and Florida. It also reported attacks from the\r\nNetherlands, Singapore, Mexico, Turkey and Vietnam using Trojan programs, botnets, phishing, theft of\r\nintellectual property and violations of privacy.\r\nAdvertisement. Scroll to continue reading.\r\nhttps://www.securityweek.com/china-protests-us-sanctions-for-its-alleged-role-in-hacking-complains-of-foreign-hacker-attacks/\r\nPage 1 of 2\n\n“They pose a major threat to China’s domestic networked units and internet users and some activities have been\r\nsuspected of criminal offenses,” the center said in a notice on its WeChat social media site.\r\nOn Friday, the Treasury’s Office of Foreign Assets Control hit Integrity Technology with sanctions that block\r\naccess to U.S. property and bank accounts and prevent the targeted people and companies from doing business\r\nwith Americans. It cited alleged multiple hacks against U.S. victims, including incidents attributed to Flax\r\nTyphoon, a Chinese state-sponsored campaign that targets U.S. critical infrastructure.\r\nThe sanctions did not appear to be related to an incident in which the Treasury Department reported that Chinese\r\nhackers had remotely accessed several of its workstations and unclassified documents in a major breach of\r\ncybersecurity.\r\nThe Treasury Department said it learned of that problem on Dec. 8, when a third-party software service provider,\r\nBeyondTrust, flagged that hackers had stolen a key “used by the vendor to secure a cloud-based service used to\r\nremotely provide technical support” to workers.\r\nU.S. officials are grappling with the fallout from a massive Chinese cyberespionage blitz known as Salt Typhoon\r\nthat they say gave officials in Beijing access to private texts and phone conversations of an unknown number of\r\nAmericans.\r\nLate last month, officials said at least eight telecommunications companies, as well as dozens of nations, had been\r\naffected by Salt Typhoon.\r\nRelated: US Treasury Slaps Sanctions on China-Linked APT31 Hackers\r\nRelated: China Denies Hacking US Treasury\r\nSource: https://www.securityweek.com/china-protests-us-sanctions-for-its-alleged-role-in-hacking-complains-of-foreign-hacker-attacks/\r\nhttps://www.securityweek.com/china-protests-us-sanctions-for-its-alleged-role-in-hacking-complains-of-foreign-hacker-attacks/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.securityweek.com/china-protests-us-sanctions-for-its-alleged-role-in-hacking-complains-of-foreign-hacker-attacks/"
	],
	"report_names": [
		"china-protests-us-sanctions-for-its-alleged-role-in-hacking-complains-of-foreign-hacker-attacks"
	],
	"threat_actors": [
		{
			"id": "09031838-56db-4676-a2b2-4bc50d8b7b0b",
			"created_at": "2024-01-23T13:22:35.078612Z",
			"updated_at": "2026-04-10T02:00:03.519282Z",
			"deleted_at": null,
			"main_name": "Flax Typhoon",
			"aliases": [
				"Ethereal Panda",
				"Storm-0919"
			],
			"source_name": "MISPGALAXY:Flax Typhoon",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "f0eca237-f191-448f-87d1-5d6b3651cbff",
			"created_at": "2024-02-06T02:00:04.140087Z",
			"updated_at": "2026-04-10T02:00:03.577326Z",
			"deleted_at": null,
			"main_name": "GhostEmperor",
			"aliases": [
				"OPERATOR PANDA",
				"FamousSparrow",
				"UNC2286",
				"Salt Typhoon",
				"RedMike"
			],
			"source_name": "MISPGALAXY:GhostEmperor",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "aacd5cbc-604b-4b6e-9e58-ef96c5d1a784",
			"created_at": "2023-01-06T13:46:38.953463Z",
			"updated_at": "2026-04-10T02:00:03.159523Z",
			"deleted_at": null,
			"main_name": "APT31",
			"aliases": [
				"JUDGMENT PANDA",
				"BRONZE VINEWOOD",
				"Red keres",
				"Violet Typhoon",
				"TA412"
			],
			"source_name": "MISPGALAXY:APT31",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "86c7abc2-1b71-4665-b9e3-1594d6d15a4a",
			"created_at": "2023-09-07T02:02:47.367254Z",
			"updated_at": "2026-04-10T02:00:04.698935Z",
			"deleted_at": null,
			"main_name": "Flax Typhoon",
			"aliases": [
				"Ethereal Panda",
				"RedJuliett"
			],
			"source_name": "ETDA:Flax Typhoon",
			"tools": [
				"BadPotato",
				"CHINACHOPPER",
				"China Chopper",
				"JuicyPotato",
				"LOLBAS",
				"LOLBins",
				"Living off the Land",
				"Metasploit",
				"Mimikatz",
				"SinoChopper",
				"SoftEther VPN"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "9e6186dd-9334-4aac-9957-98f022cd3871",
			"created_at": "2022-10-25T15:50:23.357398Z",
			"updated_at": "2026-04-10T02:00:05.368552Z",
			"deleted_at": null,
			"main_name": "ZIRCONIUM",
			"aliases": [
				"APT31",
				"Violet Typhoon"
			],
			"source_name": "MITRE:ZIRCONIUM",
			"tools": null,
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "d390d62a-6e11-46e5-a16f-a88898a8e6ff",
			"created_at": "2024-12-28T02:01:54.899899Z",
			"updated_at": "2026-04-10T02:00:04.880446Z",
			"deleted_at": null,
			"main_name": "Salt Typhoon",
			"aliases": [
				"Earth Estries",
				"FamousSparrow",
				"GhostEmperor",
				"Operator Panda",
				"RedMike",
				"Salt Typhoon",
				"UNC2286"
			],
			"source_name": "ETDA:Salt Typhoon",
			"tools": [
				"Agentemis",
				"Backdr-NQ",
				"Cobalt Strike",
				"CobaltStrike",
				"Crowdoor",
				"Cryptmerlin",
				"Deed RAT",
				"Demodex",
				"FamousSparrow",
				"FuxosDoor",
				"GHOSTSPIDER",
				"HemiGate",
				"MASOL RAT",
				"Mimikatz",
				"NBTscan",
				"NinjaCopy",
				"ProcDump",
				"PsExec",
				"PsList",
				"SnappyBee",
				"SparrowDoor",
				"TrillClient",
				"WinRAR",
				"Zingdoor",
				"certutil",
				"certutil.exe",
				"cobeacon",
				"nbtscan"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "fcff864b-9255-49cf-9d9b-2b9cb2ad7cff",
			"created_at": "2025-04-23T02:00:55.190165Z",
			"updated_at": "2026-04-10T02:00:05.361244Z",
			"deleted_at": null,
			"main_name": "Salt Typhoon",
			"aliases": [
				"Salt Typhoon"
			],
			"source_name": "MITRE:Salt Typhoon",
			"tools": [
				"JumbledPath"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "ea4726a4-3b7c-45db-a579-2abd4986941c",
			"created_at": "2025-11-01T02:04:53.002048Z",
			"updated_at": "2026-04-10T02:00:03.764362Z",
			"deleted_at": null,
			"main_name": "BRONZE FLAXEN",
			"aliases": [
				"Ethereal Panda ",
				"Flax Typhoon "
			],
			"source_name": "Secureworks:BRONZE FLAXEN",
			"tools": [
				"Bad Potato",
				"Juicy Potato",
				"Metasploit",
				"Mimikatz",
				"SoftEther VPN"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "6477a057-a76b-4b60-9135-b21ee075ca40",
			"created_at": "2025-11-01T02:04:53.060656Z",
			"updated_at": "2026-04-10T02:00:03.845594Z",
			"deleted_at": null,
			"main_name": "BRONZE TIGER",
			"aliases": [
				"Earth Estries ",
				"Famous Sparrow ",
				"Ghost Emperor ",
				"RedMike ",
				"Salt Typhoon "
			],
			"source_name": "Secureworks:BRONZE TIGER",
			"tools": [],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "74d9dada-0106-414a-8bb9-b0d527db7756",
			"created_at": "2025-08-07T02:03:24.69718Z",
			"updated_at": "2026-04-10T02:00:03.733346Z",
			"deleted_at": null,
			"main_name": "BRONZE VINEWOOD",
			"aliases": [
				"APT31 ",
				"BRONZE EXPRESS ",
				"Judgment Panda ",
				"Red Keres",
				"TA412",
				"VINEWOOD ",
				"Violet Typhoon ",
				"ZIRCONIUM "
			],
			"source_name": "Secureworks:BRONZE VINEWOOD",
			"tools": [
				"DropboxAES RAT",
				"HanaLoader",
				"Metasploit",
				"Mimikatz",
				"Reverse ICMP shell",
				"Trochilus"
			],
			"source_id": "Secureworks",
			"reports": null
		}
	],
	"ts_created_at": 1775438970,
	"ts_updated_at": 1775792146,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/cf95a4bc9861b5bdb96b20f45b56effd42931a2f.pdf",
		"text": "https://archive.orkl.eu/cf95a4bc9861b5bdb96b20f45b56effd42931a2f.txt",
		"img": "https://archive.orkl.eu/cf95a4bc9861b5bdb96b20f45b56effd42931a2f.jpg"
	}
}