News

Japanese police linked hack group Tick with Chinese military

Japanese law enforcement officials believe that the Tick hack group, linked to the Chinese military, is behind a massive cyber-espionage campaign, in which more than 200 Japanese companies and organizations have been hacked since 2016.

Various news agencies in the country, including Yomiuri Shimbun, Nikkei, NHK and The Mainichi, said the suspects used fake IDs to register web servers between 2016 and 2017.

“Tokyo police contacted a 30-year-old Chinese citizen, a student who helped hackers in these attacks. It is also reported that the two suspects have already left Japan after interrogations, but officials plan to refer the case to the prosecutor’s office and seek their official arrest”, — the Japanese media write, citing their own sources.

The aforementioned servers were subsequently used by a Chinese hacker group known as Tick to attack Japanese companies and research institutions in the aviation and national defense fields.

At the same time, the only known victim that the Japanese investigators were able to identify is the Japan Aerospace Research Agency (JAXA).

Interestingly, this is the first time that someone has linked the Tick group to the Chinese military. Thus, the Japanese media write that the hackers followed the order 61419 of the People’s Liberation Army of China, operating from the Chinese city of Qingdao in Shandong province.

Recorded Future analysts point out that the information about the connection with a specific PLA unit is most likely based on old data about Chinese military intelligence collected in the mid-2010s, before the recent military reforms and restructuring that took place in the country.

But while attribution with a specific PLA squad may be incorrect, overall researchers say the Tick group has been suspected of “working” for the Chinese military for some time.

“The group has maintained a very tight regional focus on defense and military targets within the Korean peninsula and Japan, which aligns with the suspected operational tasking of Unit 61419 prior to the restructuring of the PLA”, — the Insikt Group confirms reports of the Japanese media.

As a reminder, we also wrote that Chinese hackers also took part in attacks on SolarWinds clients and that FireEye CEO Blames Chinese Hackers for Indiscriminate Cyberattacks on Microsoft Exchange.

User Review
0 (0 votes)
Comments Rating 0 (0 reviews)
Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Recent Posts

Remove Vizoaksy pop-up ads (Virus Removal Guide)

Vizoaksy.com is a site that tries to force you into subscribing to its browser notifications…

23 hours ago

Remove Keyapp.monster pop-up ads (Virus Removal Guide)

Keyapp.monster is a site that tries to force you into clik to its browser notifications…

1 day ago

Remove Withblaockbr.org pop-up ads (Virus Removal Guide)

Withblaockbr.org is a domain that tries to trick you into subscribing to its browser notifications…

1 day ago

Remove Janorfeb.xyz pop-up ads (Virus Removal Guide)

Janorfeb.xyz is a site that tries to force you into clik to its browser notifications…

2 days ago

Remove Re-captha-version-3-263.buzz pop-up ads (Virus Removal Guide)

Re-captha-version-3-263.buzz is a domain that tries to force you into subscribing to its browser notifications…

2 days ago

Remove Usavserver pop-up ads (Virus Removal Guide)

Usavserver.com is a site that tries to force you into subscribing to its browser notifications…

2 days ago