Show full content

The I-Soon Information Technology Co. Ltd. (aka Shanghai Anxun Information Technology Co. Ltd, or Anxun) on the face of it were known be a reputable company but they were hiding a dark secret. Under their mask they were being led by the CCP. As you are probably already aware, the company was the subject of a leaked document scandal in February 24. The leaks contained around 570 files including chat logs, contracts and client lists. Documents detailing over 70 victims countries I-Soon targeted for hacking were among the hordes of information that experts and translators had to trawl through. Motivated by money? Or was it all down to pressure to perform for the CCP?
Here at Intrusion Truth, we have been closely watching and reading as the documents have been translated and validated. Many discussions have been had among the community and every threat researcher worth their salt has had their own opinions. We have been taking our time combing the documents and getting insights from write ins, to understand the full picture.

The Activity
We would imagine the CCP would not have been best pleased upon seeing I-Soon’s secrets (and in turn, their own secrets) laid out on a GitHub repository. Right around the time of the I-Soon leaks, China published their revised State Secrets Law, emphasising their holistic view of national security and eco-landing their stance in data protection. Talk about awkward timing! The CCP is trying to mobilise the whole of society to be aware of national security, yet they were betrayed by a trusted company. Not to mention, the embarrassment of reading chat logs and finding out that I-Soon seniors have been double dealing state institutions, by selling the same products to both the MPS (Ministry of Public Services and the MSS (Ministry of State Security) without informing either one. A conversation between two I-Soon employees shows them talking quite openly about re-selling data that they’ve already sold to the MSS. When a company trusted with government work talks so casually about double dealing, we start to get a sense of I-Soon’s attitude and business practices. Practices that only benefited the wealth of the company and neglected their own workforce.
The People in Charge
There is a clear chain of ownership linking I-Soon back to the Chinese state that we have been able to ascertain. When looking at the shareholders of I-Soon, we can see that Qi’Anxin (a large Chinese cybersecurity company) own 12.96%, a higher percentage than the former COO Chen Cheng (陈诚 aka lengmo) and a large enough investment that one would imagine they have a good understanding of I-SOONs operations.

So, alongside Qi’Anxins stated mission to “make cyberspace safer and the world a better place,” it also seems they invest in a company which conduct large-scale, worldwide, hacking activity. Only I-Soon’s CEO Wu Haibo (吴海波 aka shutd0wn) and another of his companies hold more shares than Qi’Anxin. It is also public knowledge that state-owned China Electronics Corporation (CEC) purchased a 22% stake in Qi’Anxin in 2019. CEC is China’s largest state-owned electronic information company, and according to thepaper.cn the main purpose of their investment in Qi’Anxin was strategic, to ensure Qi’Anxin are part of the ‘national team’ for network security. Qi’Anxin have been responsible for the cybersecurity at high profile events, including the 70th Anniversary of the CCP in Tiananmen Square, and were a Beijing Winter Olympics sponsor. Clearly, they are a trusted part of the PRC machine. The chain of ownership is clear from the state-owned CEC to I-Soon via Qi’Anxin, so it isn’t hard to see just how much of I-Soon’s irresponsible cyber activities can be traced back to the CCP. It is clear that the CCP are closely linked to I-Soon, but also to our good friends at Chengdu404 (APT41). Chat logs between Haibo and Cheng show that they were hesitant to employ Chengdu404 employees due to the heat from the FBI indictments. Maybe as they were concerned that it might draw attention to their own illicit activities.


The Employees
The job market in China is tough right now, being oversaturated with graduates from tech universities. It is not unusual to see companies exploit graduates but from the leaks we know that less than 27% of employees at I-Soon had a university degree. They opted for a more practical experience approach to recruitment. This isn’t always a bad thing if employees are paid what they are worth, but the documents showed woefully underpaid staff doing work that was far beyond the level they should be expected to undertake. With employees suffering from very low pay and having bonuses withheld; it’s not hard to imagine that they would compromise standards for a quick buck. Evidence from the leaks show specific references to “qb” “Qing bao” “情报” which we know to mean intelligence. The employees are discussing how they have been selling their “intelligence” (making Trojans and social engineering databases and selling them onto other companies) on the side to cover the losses from working at I-Soon.


Even though I-Soon paid their workforce so poorly, the company was somehow able to help Mr Cheng out with a loan of 1 million RMB (Approx $140,000) to buy a house; some very questionable priorities by I-Soon. For those that were employed as graduates, imagine believing you were joining a reputable company that would allow you to pour all your years of hard study into, only to find that your skills are being used to develop tools that enable illegal hacking, and worse – to monitor and suppress fellow Chinese citizens and diaspora. Is this not a prime motive for someone to have dropped these documents online? To add to these concerns, as reported by the Associated Press, the police are investigating the source of the leak. Presumably the investigation would include interviewing and therefore intimidating staff members over the CCP’s relentless want for hacking, surveillance and suppression.
The Innocent Parties

We can see from the leaks that I-Soon had no issues in targeting ethnic minorities with their services – a leaked draft contract shows us that I-Soon were selling “anti-terror” support to help the Bayingolin Public Security Bureau in tracking Uyghurs through phone, airline and government data. There is also evidence within the leaks that I-Soon targeted the Central Tibetan Administration as well as pro-democracy advocates in Hong Kong. I-Soon’s reach and abilities extend far beyond the PRC’s borders. It seem that even the PRC’s economic partners are not safe, from I-Soon’s extensive list of victims, 19 are fully signed up members to the PRC’s Belt and Road initiative (BRI). Those countries signed up to the BRI would have been forgiven for believing their ties to Beijing would have kept them safe from being hacked, but if anything, the case is the opposite and begs the question…just how compromised are the other 131 BRI members? I-Soon were clearly basing their services and products around requirements from their customers within China’s Public Security Bureau. It wouldn’t be a stretch to assume the exposure of irresponsible use of cyber tools would have a negative effect on the bottom line of I-Soon’s profits, but what are the real consequences of the CCP’s appetite for hacking?

The Tools
Another document in the leaks is a whitepaper for a Windows remote control management system, which includes a screenshot of the admin panel. The IP address on this screenshot has helpfully been linked by Sentinel Labs to a ShadowPad C2 server back in 2021. For those who don’t know, ShadowPad is a backdoor often used in supply chain attacks. It was discovered in 2017 and, to begin with, was only thought to be used by APT41 but has since been shared amongst many Chinese threat actors. Some documents in the leaks appear to show I-Soon marketing Treadstone, which is a malware control panel used as a controller for the Winnti malware group. In 2019 Treadstone was directly referenced and attributed to APT41 in the US indictments against Chengdu404 employees. In light of the legal action Chengdu404 were taking aginst I-Soon over software development, it is entirely possible that I-Soon developed Treadstone on behalf of Chengdu404. ShadowPad samples have been seen in Cobalt Strike infections distributed by EARTH LUSCA who have also been linked to the Treadstone controller for Winnti.
Following the leaks, EARTH LUSCA have now been identified as a likely penetration arm of I-Soon, given the overlap in IP locations, malware and victims (which includes gambling companies, COVID-19 research organizations, educational institutions in Taiwan and Hong Kong as well as telecoms companies and various government institutions globally.) We cannot emphasise enough how much over-kill the tools used were. Tools that were built to be deployed against whole states, mercilessly used against innocent parties. I-Soon themselves admit they are an APT and, according to the epochtimes a deleted “Business Services” webpage from 2013 showed that I-Soon had an established APT network penetration method research department. The title of our article speaks for itself.
As we said before, the leaks have been analysed and covered by all the top dogs in the community, and none more thoroughly than “The Natto Thoughts Blog“. The team at Natto Thoughts have done a great job at explaining the details of the leaks and what it means for different demographics.
We know this is not our usual scheduled content but we have been working extremely hard investigating new avenues to give our followers fresh insights into the Chinese cyber ecosystem. Clearly, looking at the individual actors is not enough – there is a wider state-sponsored network of companies and organisations hacking mercilessly on behalf of the CCP. Our next article we are challenging ourselves to lift the lid further on the companies, the people and ultimately those in the CCP behind it all…



















































































