A cache of stolen documents posted to GitHub appears to reveal how a Chinese infosec vendor named I-Soon offers rent-a-hacker services for Beijing.
Analysis of the docs by infosec vendor SentinelOne characterizes I-Soon as “a company who competes for low-value hacking contracts from many government agencies.”
SentinelOne and Malwarebytes found I-Soon claims to have developed tools capable of compromising devices running Linux, Windows, macOS, iOS, and Android.
Other material appears to see I-Soon bid for work in Xinjiang – a province in which Beijing persecutes the Muslim Uyghur population – by claiming to have run anti-terrorist ops in Pakistan and Afghanistan.
Some of the leaked docs describe hardware hacking devices I-Soon employs – including a poisoned power bank that uploads data into victims’ machines.
Documents detailing how I-Soon tries to win work from Chinese government agencies do therefore offer insight into how Beijing outsources its infosec offensives.
The original article contains 478 words, the summary contains 147 words. Saved 69%. I’m a bot and I’m open source!
Access to this repository has been disabled by GitHub Staff due to a violation of GitHub’s terms of service. If you are the owner of the repository, you may reach out to GitHub Support for more information.
This is the best summary I could come up with:
A cache of stolen documents posted to GitHub appears to reveal how a Chinese infosec vendor named I-Soon offers rent-a-hacker services for Beijing.
Analysis of the docs by infosec vendor SentinelOne characterizes I-Soon as “a company who competes for low-value hacking contracts from many government agencies.”
SentinelOne and Malwarebytes found I-Soon claims to have developed tools capable of compromising devices running Linux, Windows, macOS, iOS, and Android.
Other material appears to see I-Soon bid for work in Xinjiang – a province in which Beijing persecutes the Muslim Uyghur population – by claiming to have run anti-terrorist ops in Pakistan and Afghanistan.
Some of the leaked docs describe hardware hacking devices I-Soon employs – including a poisoned power bank that uploads data into victims’ machines.
Documents detailing how I-Soon tries to win work from Chinese government agencies do therefore offer insight into how Beijing outsources its infosec offensives.
The original article contains 478 words, the summary contains 147 words. Saved 69%. I’m a bot and I’m open source!
source: https://github.com/I-S00N/I-S00N/
Well shit:
Edit: Here’s one that claims any PII is redacted:
https://github.com/mttaggart/I-S00N
I downloaded the original archive as a zip file, let me know if anyone wants it to create a torrent.