US INDICTMENT – 12 Hackers Revealed!

Skull silhouette in blue computer code background.

(Patriot.buzz) – In a strong stance against cyber threats, the US government has indicted twelve Chinese hackers linked to a series of cyberattacks on the US Treasury and various foreign ministries.

See the tweet below!

Despite Beijing’s denials, these hackers, associated with China’s public security ministry, infiltrated critical US departments and targeted Chinese dissidents and US federal agencies.

This article explores the implications of these intrusions on national security and the American public’s trust.

The Trump administration recently announced charges and sanctions against twelve Chinese nationals accused of hacking various US government systems, including the vital Treasury Department.

The disclosure comes after a series of sophisticated cyber intrusions orchestrated by members of the hacker group known as APT 27 or Silk Typhoon.

This collective, reportedly supported by Chinese security ministries, targeted US federal agencies and secured-sensitive information for governmental use.

The breaches also included the Salt Typhoon infiltration into US telecommunication networks.

These attacks aren’t isolated events. Notably, Yin Kecheng and Zhou Shuai, charged for cyberattacks dating back to 2013, are tied directly to the Chinese government through the Ministry of Public Security.

The Justice Department has been clear about its resolve to pursue offenders threatening US cybersecurity.

“The Department of Justice will relentlessly pursue those who threaten our cybersecurity by stealing from our government and our people,” assured Sue J. Bai, who heads the DOJ’s National Security Division.

The global espionage campaign conducted by APT27 targeted diverse entities, including defense contractors, state governments, and critical infrastructure.

The hackers, often freelancers or employees of Anxun Information Technology Co. Ltd. (i-Soon), operated under the direction of China’s Ministry of Public Security and Ministry of State Security.

It’s a grievous reminder of the threats posed by state-sponsored cyber offenses to both national security and personal privacy.

Charges highlight i-Soon’s role in training Ministry of Public Security officers in hacking techniques and providing tools essential for operations.

The scheme managed to generate millions of dollars within China’s hacker-for-hire ecosystem, primarily targeting critics and organizations promoting human rights.

While Beijing continues to reject the claims as baseless, the gravity of these allegations demands further scrutiny.

“For years, these 10 defendants — two of whom we allege are PRC officials — used sophisticated hacking techniques to target religious organizations, journalists, and government agencies,” commented Matthew Podolsky, the Acting United States Attorney for the Southern District of New York.

The State Department has incentivized public cooperation by offering rewards for information leading to the identification and location of the charged individuals.

This reflects the urgency of tackling cyber espionage threats and securing the nation’s digital infrastructure against foreign incursions. In a similar vein, private partners like Microsoft, Volexity, PwC, and Mandiant have been instrumental in assisting investigations.

The sanctioned actions, paired with the charges, underscore the ongoing efforts to shield the US from foreign cyber-attacks.

As the US continues to hold foreign actors accountable for breaches, it becomes increasingly important for American patriots to stay vigilant and support efforts aimed at thwarting such threats.

Copyright 2025, Patriot.buzz