US Indicts Chinese Spies for Global Hacking Campaign Targeting COVID-19 Research

Key Allegations in the Case

U.S. prosecutors have unsealed an 11-count indictment against two Chinese nationals, Li Xiaoyu (34) and Dong Jiazhi (33), alleging their involvement in a decade-long global hacking operation. The defendants, reportedly working for China’s state intelligence bureau, are accused of stealing terabytes of sensitive data from high-tech companies and government entities worldwide.

Scope of the Cyber Espionage

  • Targeted hundreds of organizations across multiple continents
  • Compromised networks in the U.S., Australia, South Korea, and Europe
  • Exploited unpatched vulnerabilities in web server software
  • Installed password-stealing malware to maintain persistent access
  • Frequently returned to compromised networks, sometimes years later

COVID-19 Research Among Primary Targets

The indictment reveals particularly concerning allegations that the hackers targeted:

  • Over a dozen U.S. companies in Maryland, Massachusetts, and California
  • Organizations developing COVID-19 vaccines and treatments
  • Military satellite programs and defense contractors
  • High-value intellectual property worth “hundreds of millions of dollars”

FBI Wanted Poster for Li Xiaoyu and Dong Jiazhi FBI’s wanted notice for the alleged hackers (Image Credit: FBI)

Modus Operandi and Additional Charges

Prosecutors describe a sophisticated operation where the hackers:

  1. Conducted attacks on behalf of Chinese intelligence services
  2. Also engaged in hacking for personal financial gain
  3. Attempted to extort cryptocurrency from one victim by threatening to leak stolen source code

Government Response and Expert Analysis

John C. Demers, U.S. Assistant Attorney General for National Security, stated:

“China has now taken its place, alongside Russia, Iran and North Korea, in that shameful club of nations that provide a safe haven for cyber criminals in exchange for those criminals being ‘on call’ to work for the benefit of the state.”

Security firm Mandiant, which had tracked the hackers since 2013, confirmed the indictment’s findings align with their research. Ben Read, Mandiant’s Senior Manager of Analysis, noted:

“The pattern described in the indictment… is consistent with what we have seen from other China-nexus groups such as APT41.”

Legal Implications and Challenges

While each defendant faces potential sentences exceeding 40 years if convicted, practical challenges remain:

  • Both individuals are believed to be in China
  • Extradition to the U.S. appears unlikely
  • Case highlights growing tensions in cyber diplomacy

This indictment follows earlier warnings from the FBI and Homeland Security about Chinese attempts to steal coronavirus research data, underscoring the ongoing threat to critical medical and technological infrastructure.


🚀 Technology Solutions & Recommendations

Enhance your tech capabilities with these cutting-edge products that complement the technological innovations discussed in this article:

🛍️ Featured Product 1: HND – Passport Cover

HND – Passport Cover Image: Premium product showcase

In light of recent global cybersecurity threats and international espionage cases, travelers may be particularly conscious about protecting their personal data. This passport cover addresses those concerns at an individual level by offering basic protection against digital identity theft while traveling.

The HND Passport Cover provides discreet protection for your travel documents, shielding sensitive information from prying eyes. While it can’t stop state-sponsored hacking campaigns like the one described in the article, this RFID-blocking sleeve offers everyday security against digital skimming attempts. Made from durable materials, it’s designed to keep your passport safe during international travel.

Key Features:

  • RFID-blocking technology to prevent digital theft
  • Premium synthetic leather construction
  • Slim profile fits standard passports
  • Available in multiple security-conscious colors

🔗 View Product Details & Purchase


🛍️ Featured Product 2: HKG Code – Sweatshirt

HKG Code – Sweatshirt Image: Premium product showcase

This sweatshirt appeals to readers concerned about cybersecurity and privacy—especially those following stories about hacking threats. While it’s not a security tool, it’s a subtle nod to staying vigilant in an increasingly digital world.

The HKG Code Sweatshirt is a comfortable, stylish piece designed for those who value both security awareness and casual comfort. While it won’t protect you from cyber threats, its sleek design and soft fabric make it a great choice for staying cozy during long hours of remote work or research—whether you’re developing vaccines or just browsing safely at home.

Key Features:

  • Premium cotton blend for all-day comfort
  • Minimalist design with subtle HKG Code branding
  • Available in multiple colors to suit your style
  • Machine washable for easy care

🔗 View Product Details & Purchase


🛍️ Featured Product 3: HKG – Poster

HKG – Poster Image: Premium product showcase

This product resonates with readers concerned about cybersecurity threats highlighted in the article, offering a tangible way to reflect on digital vulnerabilities while decorating their workspace or home. It’s particularly relevant given the reported targeting of COVID-19 research by hackers, serving as a reminder of why data protection matters.

The HKG – Poster is a striking, high-quality wall art piece designed to inspire awareness and critical thinking about global cybersecurity and digital privacy. Featuring bold visuals and thought-provoking design, this poster serves as a conversation starter about the importance of protecting sensitive data—from personal information to critical research like COVID-19 vaccine development. While not a security tool itself, it symbolizes vigilance in an era where cyber threats make headlines daily.

Key Features:

  • Premium matte finish print for vibrant visuals
  • Available in multiple sizes to fit any space
  • Minimalist yet impactful design
  • Made from eco-friendly materials

🔗 View Product Details & Purchase

💡 Need Tech Consultation? Our technology experts are ready to help you implement the perfect solution for your digital transformation needs!

Remaining 0% to read
All articles, information, and images displayed on this site are uploaded by registered users (some news/media content is reprinted from network cooperation media) and are for reference only. The intellectual property rights of any content uploaded or published by users through this site belong to the users or the original copyright owners. If we have infringed your copyright, please contact us and we will rectify it within three working days.