China Hackers found in Tor

China Hackers found in Tor

gAtO bEeN crawling – Tor and found China — China, Fujian IP found in Tor but is it really the Chinese or someone else. As I work on the Tor-Directory-Project to map out every URL in Tor. I came to these site


http://yaiaqf3te6khr3nd.onion/ – This sites has 3 different sites in one – 3 index front pages-DOORS – fUnNy nO?


Now what’s so weird about these 2 sites 4 IP address on the site for proxies and Tor in CHINA.  This ain’t right, China does it’s best to block Tor and keep it’s citizens away from Tor so why would a website in Tor place these explicit IP address and telling you to use them.  In Tor you try to hide not give IP out that can be traced, so why is this different???

So I back trace these 4 sites 3 in China 1 is Soul,Korea, then you google “Fujian Providence hacking”

Yeah there are a lot of things happening in that part of China but is it really the Chinese or others. Russians maybe??

These 2 sites are linked to “Anonet” the funny (ha ha) thing is this one person that keeps popping up – (Anonymous Coward ) on both these sites-  and he/she leads back to China too mAyBe -Si-nO. The Chinese use the Anonymous Coward to mock Anonymous which are very dangerous in China but this does not look good folks.

We talk about China hacking us and when people like myself find these sites and try to report them  – no way- I’m just a nobody that has one of the largest Tor search engines around. Just from these 2 sites I have 56 URL’s – Maybe one of these cyber Professional should check these 2 sites out – I have a subscription service for Tor Search engine any governments or law enforcement out there that need this — talk to gAtO—

They may find one source of China Hacking the US and other places – gAtO oUt

Chinanet Fujian Province Network  IP Address:

Chinanet Fujian Province Network  IP Address:

Chinanet Fujian Province Network  IP Address:  ISP: SK Broadband Co Ltd Region:

Seoul (KR)  IP Address:

China Unicom Heilongjiang Province Network  ISP: Region: Harbin (CN)


China Cyber-Warfare Capabilities

Cyber Espionage and Cyberwarfare Capabilities.

In 2011, computer networks and systems around the world continued to be targets of intrusions and data theft, many of which originated within China. Although some of the targeted systems were U.S. government-owned, others were commercial networks owned by private companies whose stolen data represents valuable intellectual property. In the hands of overseas competitors, this information could diminish commercial and technological advantages earned through years of hard work and investment. Intrusions in 2011 occurred in key sectors, including companies that directly support U.S. defense programs.

Authoritative writings and China’s persistent cyber intrusions indicates the likelihood that Beijing is using cyber network operations (CNOs) as a tool to collect strategic intelligence. In parallel with its military preparations, China has increased diplomatic engagement and advocacy in multilateral and international forums where cyber issues are discussed and debated. Beijing’s agenda is frequently in line with Russia’s e&orts to promote cyber norms under a UN framework. In September 2011, China and Russia were the primary sponsors of an Information Security Code of Conduct that would have governments exercise sovereign authority over the %ow of information in cyberspace. China has not yet accepted that existing mechanisms (such as the Law of Armed Con%ict), apply in cyberspace. However, China’s thinking in this area may evolve as its own exposure increases through greater investment in global networks.

Technology Transfer, Strategic Trade Policy, and Military Modernization. 

The PRC continues to modernize its military by incorporating Western (mostly U.S.) dual-use technologies, which have also assisted its overall indigenous industrial, military industrial, and high-technology sector development. One of the PRC’s stated national security objectives is to leverage legally and illegally acquired dual-use and military-related technologies to its advantage. China has a long history of cooperation between its civilian and military sectors and openly espouses the need to exploit civilian technologies for use in its military modernization. In this context, the cumulative e&ect of U.S. dual-use technology transfers to China could also make a substantial material contribution to its military capabilities. For example, interactions with Western aviation manufacturing !rms may also inadvertently provide bene!t to China’s defense aviation industry. “rough its advisory role within the U.S. export control process, DoD will continue to identify and mitigate risk, and seek to prevent critical advanced technologies exports to China that could be diverted to unauthorized end-use or to third-country end-users of concern, or contribute to overall modernization of China’s military and defense industrial base.


Chinese actors are the world’s most active and persistent perpetrators of economic espionage. Chinese attempts to collect U.S. technological and economic information will continue at a high level and will represent a growing and persistent threat to U.S. economic security. “e nature of the cyber threat will evolve with continuing technological advances in the global information environment.

Sensitive U.S. economic information and technology are targeted by intelligence services, private sector companies, academic/research institutions, and citizens of dozens of countries. China is likely to remain an aggressive and capable collector of sensitive U.S. economic information and technologies, particularly in cyberspace.

Civil-Military Integration. :

China’s defense industry has bene!ted from China’s rapidly expanding civilian economy, particularly its science and technology sector. Access to foreign advanced dual-use technology assists China’s civilian economic integration into the global production and research and development (R&D) chain. For example, with increasing globalization and integration of information technologies, companies such as Huawei, Datang, and Zhongxing, with their ties to the PRC government and PLA entities, pose potential challenges in the blurring lines between commercial and government/military-associated entities.


Will .China Mobile. Spy on U.S?

gAtO wAs- reading Stan Abrams a lawyer and professor in Beijing, China article about “Will China Mobile Get It’s U.S. License Approved? – http://www.businessinsider.com/will-china-mobile-get-its-us-license-approved-2012-5 the FCC “Team Telecom” has all the power in this deal. This is simple when a foreign ownership wants to come into our telecom world we want the DHS, DOJ, FBI DoD to investigate them for backdoor into the infrastructure that no virus scan can detect- in the hardware and firmware….

This is a big deal, we gave the OK a few years ago to China Telecom and China Unicom similar licenses in 2002-03. Why the big deal now. Well the last few years China has increased it’s attacks on U.S companies sucking in their IP (-Intellectual Properties). To top things off Huawei just got turned down down-under in Australia to allow it to come into their Telecom network. Once again when you give access to our telecom network we are giving them the key to all our information. Now keep in mind that we still have over 60-70% of our government C&C (Command and Control) running on our public Internet pipelines. Back a few years ago China re-routed over 15% of all the Internet traffic thru their routers. While we developed a kill switch to isolate us from the rest of the world and do a reset. Anyway the FCC has a lot of power that no one knows about check out there liaison activities list below it quite interesting.


Okay, reality check time. I doubt that China Mobile would want the type of scrutiny that a court case would mandate, so I don’t expect a formal challenge to a rejection from “Team Telecom.” Certainly Beijing doesn’t want China Mobile to disclose to anyone what it is required by Chinese law to do with data on its networks (hint: government monitoring). Moreover, the U.S. national security apparatus certainly wouldn’t want to disclose what it knows to the “other side” (i.e. China). And at the end of the day, neither side wishes to disclose any of this to the general public.



If they turn China Mobile down and it’s contested it would be good to see what evidence the U.S. Government has to say “we believe this company is spying on us with these backdoors they put in”.  Yeah in an election year it’s going to get hot with China if they play a bad boy I think Obama may have to show them what we can really do in cyber space -gAtO oUt


FCC Homeland Security – Liaison Activities http://transition.fcc.gov/pshs/docs/liaison.pdf

Read more: http://www.chinahearsay.com/will-china-mobile-get-its-u-s-license-approved/#ixzz1uBhPIJEt

CodeName Tempest http://en.wikipedia.org/wiki/TEMPEST


Huawei Spying on Customer

Huawei - Mitt Romney's Bain Capital sold out 3Com to the Chinese

gAtO wRoTe – about the Chinese company Huawei (Shenzhen, China-based company) a long time ago with it’s ties to Rick Perry the governor of Texas and ex-Presidential bid and Mitt Romney’s company Bain Capital that sold out 3Com and sold our national secrets to them. Now it finally falls on Australia to take the first step WHEN electoral fortunes are fading a good “reds under the beds” story can boost political stocks, but the row about Chinese telecommunications equipment supplier Huawei being barred from supplying equipment to the National Broadband Network puts a new twist on an old tactic. Generally it’s the Right that beats the red peril drum. Here in Australia it’s a Labor government claiming the NBN is too vital a piece of national infrastructure to be put at risk by buying equipment from China.

Huawei, which is second only to Sweden’s Ericsson in telecom equipment sales, was blocked on Monday from bidding on a $36 billion Australian national broadband contract. Security firm Symantec (SYMC, Fortune 500) ended in November because of Symantec’s concerns that its relationship with Huawei would prevent it from getting a sensitive U.S. government security contract.

Will this be the tipping point were we America stands up and see’s pass the profits and starts with looking at our nations cyber security survival. We hear that DHS and NSA and everyone is pushing for dollars $$ to fix our infrastructure but when will we start to stop the Chinese from stealing our intellectual capital that has made America great. Politicians need to take a look at what is the real problem like Rick Perry allowing dozens of Chinese companies to set up shop in Texas and claiming that they have such a great employment record at the cost of our national security.

gAtO is sad that we see the veterans of our great country without a job when we could be investing in Cyber Security training our young veterans in this field. Veterans have vital experience but as gAtO has found out personally the VA has a problem with allowing our veterans to get an education in this vital field of Internet Security. I like China don’t get me wrong and some of the accusation about China I suspect is nothing more that a scare tactic to get funding for political pet project. But if we start to training our veterans and anyone who wants this training we will not lose the cyber war- gAtO oUt 


Are Chinese Telecoms acting as the ears for the Sri Lankan government?

The title is inspired by the article Are Chinese Telecoms Acting as the Ears for Central Asian Authoritarians? published in Eurasianet.org, examining the probable role of Chinese telecoms firms, notably Huawei and ZTE, in espionage and surveillance. The article notes that both ZTE and Huawei have signed contracts worth tens of millions of US dollars with governments in Central Asia, not known for their democratic credentials. The article also flags an on-going US congressional committee probe into the two companies in particular, and how the telecoms products (like USB dongles) and possibly even services  (including underlying network technologies and infrastructure) aid espionage. As the article avers,

via Are Chinese Telecoms acting as the ears for the Sri Lankan government? – Groundviews.


Hacked: How China is stealing Americas business secrets

Sen. John Kerry is fed up with Chinas penchant for looting technology from U.S. businesses — up to $400 billion worth of data each year. When will it stop?POSTED ON FEBRUARY 16, 2012, AT 3:52 PMChinese gamers at an internet cafe: Sen. John Kerry D-Mass. says Chinese hackers are illegally stealing business secrets from American firms. Photo: Imaginechina/Corbis SEE ALL 54 PHOTOSChinese Vice President Xi Jinping, slated to be the next leader of the worlds most populous nation, is getting an earful from U.S. officials over Chinas shady business practices. During Xis first official tour of the U.S. this week, Sen. John Kerry D-Mass. accused a Chinese company of bankrupting a U.S. competitor by ransacking its software. And thats just the tip of the iceberg, alleges Kerry, implicating China in “cyber-attacks, access-to-market issues, espionage [and] theft.” And, indeed, a flurry of recent reports indicate that Chinese hackers, backed by the government, are stealing business secrets from the U.S. Here, a guide:

via Hacked: How China is stealing Americas business secrets – The Week.


Cyber-Spies Intercepted Sensitive Files, Emails From Nortel: Report – Security – News & Reviews – eWeek.com

Attackers breached Nortel and had free rein to spy on its internal network and communications from 2000 to 2009, according to an internal report. As usual, China is the prime suspect.

Chinese hackers allegedly breached telecommunications company Nortel in 2000 and these cyber-spies gained access to reams of sensitive technical documents, as well as internal communications and email, for nearly 10 years, according to a report in The Wall Street Journal.

The attackers, suspected of being based in China, breached the network using stolen credentials and installed spying software deep within the company’s networking environment to gain access to all documents and communications, the Journal reported Feb. 14. The breach appears to date as far back as 2000, Brian Shields, the former senior advisor for systems security at Nortel who led the internal investigation, told the paper.

via Cyber-Spies Intercepted Sensitive Files, Emails From Nortel: Report – Security – News & Reviews – eWeek.com.


McConnell, Chertoff and Lynn: Chinas Cyber Thievery Is National Policy—And Must Be Challenged – WSJ.com

By MIKE MCCONNELL, MICHAEL CHERTOFF AND WILLIAM LYNNOnly three months ago, we would have violated U.S. secrecy laws by sharing what we write here—even though, as a former director of national intelligence, secretary of homeland security, and deputy secretary of defense, we have long known it to be true. The Chinese government has a national policy of economic espionage in cyberspace. In fact, the Chinese are the worlds most active and persistent practitioners of cyber espionage today.Evidence of Chinas economically devastating theft of proprietary technologies and other intellectual property from U.S. companies is growing. Only in October 2011 were details declassified in a report to Congress by the Office of the National Counterintelligence Executive. Each of us has been speaking publicly for years about the ability of cyber terrorists to cripple our critical infrastructure, including financial networks and the power grid. Now this report finally reveals what we couldnt say before: The threat of economic cyber espionage looms even more ominously.

via McConnell, Chertoff and Lynn: Chinas Cyber Thievery Is National Policy—And Must Be Challenged – WSJ.com.


PLA “Online Blue Army” gets ready for cyber warfare

Defense Ministry spokesman Geng Yansheng hosts the ministry’s second regular press conference in Beijing, May 25, 2011. [Photo/China Daily, mod.gov.cn]

The People’s Liberation Army (PLA) confirmed in May 2011 that it has established an “Online Blue Army” to improve China’s defense capability and ensure the security of the country’s military network. The announcement drew close attention from military watchers and experts worldwide.

Zhang Shaozhong, a military expert and a professor from PLA National Defense University, told the People’s Daily that China is increasingly dependent on the Internet, but makes no domestic root servers, and various other types of software and Internet hardware are U.S. made. In this sense, China can be described as merely a computer user with a fairly fragile Internet security system. These are circumstances that cry out for the build up of Internet security forces.

Throughout 2010, 480,000 Trojans viruses and 13,782 Zombie viruses were detected, with 221,000 Trojan and 6,531 Zombie remote control clients found to originate in foreign countries.

via PLA “Online Blue Army” gets ready for cyber warfare – Headlines, features, photo and videos from ecns.cn.


Hacker Attacks on U.S. Reveal China’s Weakness, Lack of Innovation | Espionage & Cyberwar | National Security | SecurityNewsDaily

It must have been a merry Christmas and a happy New Year for professional cyberwarriors, as extensive new Pentagon plans focusing on Internet security were revealed in mid-December, just after a week’s worth of stories appeared in the business press about massive information theft by Chinese hackers.

On the surface, the combination of media reports and defense posturing seem to indicate a new Chinese digital offensive against American interests. Dramatic as that may sound, these events are merely part of the status quo in the brittle relationship between the Chinese economy and innovative American companies, and not the first shots of a digital Pearl Harbor.

via Hacker Attacks on U.S. Reveal China’s Weakness, Lack of Innovation | Espionage & Cyberwar | National Security | SecurityNewsDaily.