Chinese Companies Linked With Hackers Filed Patents Over 10+ Forensics and Intrusion Tools

The patents, registered by firms named in recent U.S. Department of Justice indictments, detail sophisticated offensive capabilities including encrypted endpoint data acquisition, mobile device forensics, and network traffic interception from routers and smart home appliances. “The variety of tools under the control of Shanghai Firetech exceeds those attributed to Hafnium and Silk Typhoon publicly,” said Dakota Cary, China-focused strategic advisor for SentinelLabs. Patents for “intelligent home appliances analysis platform,” “long-range household computer network intelligentized control software,” and “remote cellphone evidence collection software” could enable sophisticated surveillance of individuals in their homes. The findings stem from July 2025 DOJ indictments of Chinese hackers Xu Zewei and Zhang Yu, who allegedly operated under the direction of China’s Ministry of State Security (MSS) through the Shanghai State Security Bureau. The DOJ indictments reveal a tiered ecosystem of Chinese cyber contractors, with Shanghai Firetech operating at the highest level of trust with intelligence services. Unlike lower-tier firms that sell access opportunistically, Shanghai Firetech worked on specific tasking from MSS officers, indicating an ongoing, trusted relationship with China’s premier intelligence agency. Cybersecurity researchers have uncovered more than 10 patents for highly intrusive forensics and data collection technologies filed by Chinese companies directly linked to state-sponsored hacking operations, according to a new report from SentinelLABS released this week. The technologies represent a significant expansion beyond previously documented capabilities of China’s elite Hafnium threat actor group, also known as Silk Typhoon. Shanghai Firetech maintains a subsidiary in Chongqing that appears larger than its Shanghai headquarters, suggesting broader operations across China’s regional MSS offices. The revelations underscore the sophisticated nature of China’s cyber contracting ecosystem and the challenge facing defenders in accurately attributing state-sponsored attacks to their true operators. The absence of these additional capabilities in public Hafnium attribution may reflect either their use in covert operations or the FBI’s strategic decision to reveal only widely recognized activities in the indictments. Xu worked for Shanghai Powerock Network Company while Zhang Yu was employed at Shanghai Firetech Information Science and Technology Company. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. “Threat actor tracking typically links campaigns and clusters of activity to a named actor,” Cary explained. That campaign prompted the first-ever joint U.S.-U.K.-European Union statement condemning China’s cyber activities. More concerning are recent patent filings suggesting capabilities suited for human intelligence operations. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 31 Jul 2025 14:15:24 +0000


Cyber News related to Chinese Companies Linked With Hackers Filed Patents Over 10+ Forensics and Intrusion Tools

Congress Must Stop Pushing Bills That Will Benefit Patent Trolls - The U.S. Senate is moving forward with two bills that would enrich patent trolls, patent system insiders, and a few large companies that rely on flimsy patents, at the expense of everyone else. One bill, the Patent Eligibility Restoration Act would ...
1 year ago Eff.org
Chinese Companies Linked With Hackers Filed Patents Over 10+ Forensics and Intrusion Tools - The patents, registered by firms named in recent U.S. Department of Justice indictments, detail sophisticated offensive capabilities including encrypted endpoint data acquisition, mobile device forensics, and network traffic interception from routers ...
3 months ago Cybersecuritynews.com HAFNIUM
Chinese hacking documents offer glimpse into state surveillance - Chinese police are investigating an unauthorized and highly unusual online dump of documents from a private security contractor linked to the nation's top policing agency and other parts of its government - a trove that catalogs apparent hacking ...
1 year ago Apnews.com
Using Memory Forensics Tools To Enhance Advanced Incident Response - By combining proper tools, trained personnel, and well-defined procedures, organizations can leverage memory forensics to significantly enhance their incident response capabilities and improve their overall security posture against increasingly ...
6 months ago Cybersecuritynews.com
Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools - Patents for “specially designed computer hard drive decryption software” and “remote cellphone evidence collection software” indicate sophisticated mobile device compromise capabilities that have not been publicly attributed ...
3 months ago Cybersecuritynews.com
Stupid Patent of the Month: Selfie Contests - This is especially true of software patents, an area EFF has been speaking out about for more than 20 years now. This month's Stupid Patent, No. 8,655,715, continues the tradition of trying to use software language to capture a monopoly on a basic ...
1 year ago Eff.org
CVE-2023-53649 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago
How To Fight Bad Patents: 2023 Year In Review - EFF's longstanding project of fighting for a more balanced, just patent system has always borne free expression in mind. Patent trolls, who simply use intellectual property rights to extract money from others, continue to be a barrier to people who ...
1 year ago Eff.org
Thoma Bravo Acquires Magnet Forensics in Billion Dollar Deal - Thoma Bravo, a leading private equity investment firm, recently announced an agreement to acquire Magnet Forensics, a global leader in digital investigation technology, in a billion-dollar deal. This marks the largest Thoma Bravo purchase ever and ...
2 years ago Securityweek.com
What is digital forensics and incident response? - Digital forensics and incident response is a combined set of cybersecurity operations that incident response teams use to detect, investigate and respond to cybersecurity events. As the acronym implies, DFIR integrates digital forensics and incident ...
1 year ago Techtarget.com
Cybersecurity Crisis Looms: FBI Chief Unveils Chinese Hackers' Plan to Target US Infrastructure - As the head of the FBI pointed out Wednesday, Beijing was positioning itself to disrupt the daily lives of Americans if there was ever a war between the United States and China if it were to plant malware to damage civilian infrastructure. U.S. ...
1 year ago Cysecurity.news Volt Typhoon
Uncovering Chinas Surveillance of the United States Spies Hackers and Informants - Last week, a Chinese surveillance balloon in the United States caused a diplomatic uproar and raised concerns about how Beijing collects intelligence on its biggest rival. FBI Director Christopher Wray said in 2020 that Chinese spying is the most ...
2 years ago Securityweek.com Silence
Digital Forensics In 2025: How CSOs Can Lead Effective Investigations - Digital forensics now encompasses a broad spectrum of investigative techniques and methodologies used to extract, preserve, and analyze data from computers, smartphones, servers, cloud platforms, and a wide array of Internet of Things (IoT) devices. ...
6 months ago Cybersecuritynews.com
8 Tips on Leveraging AI Tools Without Compromising Security - Forecasts like the Nielsen Norman Group estimating that AI tools may improve an employee's productivity by 66% have companies everywhere wanting to leverage these tools immediately. How can companies employ these powerful AI/ML tools without ...
1 year ago Darkreading.com
10 Best Digital Forensic Tools - 2025 - Belkasoft X is a modern digital forensics suite that excels at extracting and analyzing evidence from computers, mobile devices, and cloud services. Comparison Table: Top 10 Digital Forensic Investigation Tools 2024 Tool NameComputer ForensicsMobile ...
4 months ago Cybersecuritynews.com Axiom
Belgium probes if Chinese hackers breached its intelligence service - According to The Brussels Times, the hacked server also routed internal HR exchanges among Belgian intelligence personnel, raising concerns about the potential exposure of sensitive personal data including identity documents and CVs belonging to ...
8 months ago Bleepingcomputer.com APT3 APT30 GALLIUM
DHS and FBI: Chinese Drones Pose Major Threat to U.S. Security - The cybersecurity arm of the Department of Homeland Security and the Federal Bureau of Investigation have jointly issued a public service announcement cautioning about the potential risks posed by Chinese-manufactured drones to critical ...
1 year ago Cysecurity.news
How Digital Forensics Supports Incident Response: Insights For Security Leaders - This article explores how digital forensics enhances incident response, the essential techniques involved, and practical strategies for security leaders to implement robust DFIR capabilities. Digital forensics focused on the collection, preservation, ...
6 months ago Cybersecuritynews.com
China-linked hackers target European healthcare orgs in suspected espionage campaign | The Record from Recorded Future News - A previously unknown hacking group has been spotted targeting European healthcare organizations using spyware linked to Chinese state-backed hackers and a new ransomware strain, researchers said. The hackers, dubbed Green Nailao, deployed ShadowPad ...
8 months ago Therecord.media
Building A Unified Security Strategy: Integrating Digital Forensics, XDR, And EDR For Maximum Protection - To effectively counter these threats, organizations must integrate Digital Forensics, Extended Detection and Response (XDR), and Endpoint Detection and Response (EDR) into a unified security framework. It involves two main components: digital ...
6 months ago Cybersecuritynews.com
SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022 - MSSPs took the lead in cybersecurity M&A in 2022 with twice as many deals as in 2021. An analysis conducted by SecurityWeek shows that more than 450 cybersecurity-related mergers and acquisitions were announced in 2022. In 2022, we tracked a total of ...
2 years ago Securityweek.com
Chinese Hackers Turn To Golang For Malware - Chinese hackers are increasingly turning to the open-source programming language Golang to maliciously code and launch new cyberattacks. According to the latest analysis by The Hacker News, this has resulted in an increase in the number of cyber ...
2 years ago Thehackernews.com BlackTech Carbanak
Best of 2023: Diamond Model of Intrusion Analysis: A Quick Guide - Any intrusion into a network calls for a thorough analysis to give security teams cyber intelligence about different threats and to help thwart similar future attacks. Effective incident analysis has long been held back by uncertainty and high false ...
1 year ago Securityboulevard.com Axiom
FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches - In January, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions against Sichuan Juxinhe Network Technology, a Chinese cybersecurity firm believed to be directly involved in the Salt Typhoon telecom ...
6 months ago Bleepingcomputer.com
7 Months Inside an Online Scam Labor Camp - He had been kidnapped and forced to work for an abusive online scam operation. A man was abducted by a Chinese gang and forced to work in a scam operation. More than anything else, Neo Lu, a 28-year-old Chinese office worker, believed the gig would ...
1 year ago Nytimes.com

Cyber Trends (last 7 days)