US DoJ Indicts Chinese Man for Anthem Breach
Fujie Wang allegedly worked as part of a hacking team out of China that stole information on nearly 80 million Americans in the massive healthcare breach.
The US Department of Justice (DoJ) today unsealed an indictment of a Chinese national who allegedly was part of a hacking group in China behind the massive 2015 data breach of Anthem, as well as attacks on three other large US businesses.
As part of the hacking group, Fujie Wang, aka Dennis Wang and Wang Fujie, 32, allegedly helped steal names, identification numbers, birthdates, Social Security, and other personal information about 78.8 million people in the Anthem breach, as well as in attacks on unnamed technology, communications, and materials sector companies, according to the indictment. Also included in the filing is an unnamed individual named John Doe, aka Deniel Jack, Kim Young, and Zhou Zhihong, who, along with Wang, was charged with one count of conspiracy to commit fraud and related activity in relation to computers and identity theft, one count of conspiracy to commit wire fraud, and two counts of intentional damage to a protected computer.
While the DoJ indictment did not name the Chinese hacking team, Symantec previous had identified the Anthem hackers as part of the so-called Black Vine group that has been active since around 2012, targeting healthcare, aerospace, and energy organizations. The group was believed to have some ties to a China-based IT security organization named Topsec.
The findings documented in this report lead Symantec to believe that Black Vine is an attack group that has working relationships with multiple cyberespionage actors. The group is well-funded and organized, according to Symantec, and comprises at least a few members, some of whom may have a past or present association with a China-based IT security organization called Topsec.
"The allegations in the indictment unsealed today outline the activities of a brazen China-based computer hacking group that committed one of the worst data breaches in history," said Assistant Attorney General Brian Benczkowski. "These defendants allegedly attacked U.S. businesses operating in four distinct industry sectors, and violated the privacy of over 78 million people by stealing their PII."
But like most DoJ indictments of foreign nationals living in nations where the US has no extradition agreement, it's unlikely Wang will be apprehended by US authorities unless he travels outside China or Chinese officials turn him over to the US. Even so, the DoJ began executing its indictment strategy five years ago, starting with the historic indictment of five Chinese military officers for leading cyberattacks that stole intellectual property from major American steel, solar energy, and other manufacturing companies, including Alcoa, Westinghouse Electric, and US Steel.
Patiently Waiting
According to the indictment, the hackers began their attacks with spear-phishing emails that contained malicious URLs to employees at the victim businesses: Clicking on that link sent backdoor malware to the victim's machine. "Defendants sometimes patiently waited months before taking further action," the indictment said.
The attackers then began moving laterally and gathered intelligence, including from Anthem's data warehouse during October and November of 2014, where it stored PII information
In 2015, they ultimately siphoned the stolen data from Anthem in encrypted archive files and sent them to several locations in China, via the Citrix ShareFile data storage and transfer service as part of that transport. The attackers later deleted the archive files from the victim networks to cover their tracks.
Main Domain Man
Wang allegedly managed and controlled two domain names associated with the hacking group's operation. The attackers were tossed from Anthem's network around Jan. 31, 2015, when the healthcare company began its incident response operation.
Related Content:
Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.
About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024