• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking data security Latest Cybersecurity News

Four Chinese hackers were charged for Equifax data breach

William Marshal Posted On February 12, 2020
1



Hackers-of-Equifax-data-breach

Equifax data breach in 2017 was a historic incident in cybersecurity industry that exposed the personal and financial details of 143 million Americans. The attackers behind this huge data breach was identified to be four Chinese government sponsored military hackers. The United States Department of Justice announced the details of the hackers over their press release and in a join press conference held on Feb 10th with David Bowdich theFBI Deputy Director and William Barr the Attorney General.

Four hackers who were accused of this data breach are Xu Ke, Liu Lei, Wu Zhiyong, and Wang Qian. They have been charged with stealing intellectual property, confidential information, trade secrets, social security numbers, names, birth dates, credit card numbers, and passwords. It is believed that these hackers have made at least 9000 unique queries to fetch the details of the Americans and other businesses in the America.

Looking back at the Equifax data breach

The hackers have compromised Equifax servers by exploiting a Apache Struts vulnerability in their web framework. Hackers used this loophole to breach into Equifax’s online dispute portal, fetch the credentials for logging-in, and then ran numerous queries to study the DB framework, and PII details. After accessing the required information, the attackers then stored the details in temp files by compressing them, and then finally extracting them from the Equifax network.

They disguised themselves as an encrypted communication to build trust with Equifax servers. They have also spoofed their original location by masking themselves through 34 servers and from 20 countries. Also they left no track of their activity by deleting the log files when they accomplished their mission and extraction.

Equifax paid £500K as a penalty for breaching the U.K’s privacy norms, including $700 million for United States. 

More cyber espionage

The four Chinese hackers are now residing in China, and have been included as the most wanted cyber criminals of the FBI. This is not the first time when Chinese hackers have been penalized for attack on the United States, in 2015 two Chinese hackers were charged for massive data breach on American Health Company and in 2014 again five Chinese hackers were charged for cyber espionage over the American companies.

Last month US official arrested Aleksei Burkov for multiple cyber crimes, and three Indonesian hackers were arrested for MageCart attacks.

Cyber criminals are operating 24*7 to extract data and cause havoc to businesses, please stay secured with the right cyber strategies to defend against them. 

Share the article with your friends


Equifax data breach attackershackers of equifax data breach


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

1 Comment

primarytech.com
September 24, 2020 at 3:34 am
Reply

Hello, I think that I saw you visited my web site so i came to “return
the favour”.I am looking for things to improve my site!Perhaps
its
ok to use a handful of your opinions!! 🙂


Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search