Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
Google Messages now lets you review and edit Smart Replies before sending

Google Messages now lets you review and edit Smart Replies before sending

10 March 2026
Yann LeCun Raises  Billion to Build AI That Understands the Physical World

Yann LeCun Raises $1 Billion to Build AI That Understands the Physical World

10 March 2026
Super Pixel Tech by TCL CSOT could finally end the smartphone display compromises

Super Pixel Tech by TCL CSOT could finally end the smartphone display compromises

10 March 2026
Facebook X (Twitter) Instagram
Just In
  • Google Messages now lets you review and edit Smart Replies before sending
  • Yann LeCun Raises $1 Billion to Build AI That Understands the Physical World
  • Super Pixel Tech by TCL CSOT could finally end the smartphone display compromises
  • Apple’s next MacBook Neo might let you tap the screen
  • You can now buy the Asus ROG Cetra Open Wireless earbuds in the US
  • Fatal Frame II: Crimson Butterfly Remake Review – Frustration Behind The Camera
  • Humanoid robot offers a peek into a future without chores
  • T-Mobile 5G Home Internet offers $20 off home internet per month for 5 years and $300 back
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » Security News This Week: A Mysterious Leak Exposed Chinese Hacking Secrets
News

Security News This Week: A Mysterious Leak Exposed Chinese Hacking Secrets

News RoomBy News Room24 February 20244 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Security News This Week: A Mysterious Leak Exposed Chinese Hacking Secrets
Share
Facebook Twitter LinkedIn Pinterest Email

While the documents have now been removed from GitHub, where they were first posted, the identity and motivations of the person, or people, who leaked them remains a mystery. However, Chang says the documents appear to be real, a fact confirmed by two employees working for i-Soon, according to the Associated Press, which reported that the company and police in China are investigating the leak.

“There are around eight categories of the leaked files. We can see how i-Soon engaged with China’s national security authorities, the details of i-Soon’s products and financial problems,” Chang says. “More importantly, we spotted documents detailing how i-Soon supported the development of the notorious remote access Trojan (RAT), ShadowPad,” Chang adds. The ShadowPad malware has been used by Chinese hacking groups since at least 2017.

Since the files were first published, security researchers have been poring over their contents and analyzing the documentation. Included were references to software to run disinformation campaigns on X, details of efforts to access communications data across Asia, and targets within governments in the United Kingdom, India, and elsewhere, according to reports by the New York Times and the The Washington Post. The documents also reveal how i-Soon worked for China’s Ministry of State Security and the People’s Liberation Army.

According to researchers at SentinelOne, the files also include pictures of “custom hardware snooping devices,” such as a power bank that could help steal data and the company’s marketing materials. “In a bid to get work in Xinjiang–where China subjects millions of Ugyhurs to what the UN Human Rights Council has called genocide–the company bragged about past counterterrorism work,” the researchers write. “The company listed other terrorism-related targets the company had hacked previously as evidence of their ability to perform these tasks, including targeting counterterrorism centers in Pakistan and Afghanistan.”

The Federal Trade Commission has fined antivirus firm Avast $16.5 for collecting and selling people’s web browsing data through its browser extensions and security software. This included the details of web searches and the sites people visited, which, according to the FTC, revealed people’s “religious beliefs, health concerns, political leanings, location, financial status, visits to child-directed content and other sensitive information.” The company sold the data through its subsidiary Jumpshot, the FTC said in an order announcing the fine.

The ban also places five obligations on Avast: not to sell or license browsing data for advertising purposes; to obtain consent if it is selling data from non-Avast products; delete information it transferred to Jumpshot and any algorithms created from the data; tell customers about the data it sold; and introduce a new privacy program to address the problems the FTC found. An Avast spokesperson said that while they “disagree with the FTC’s allegations and characterization of the facts,” they are “pleased to resolve this matter.”

Two Chinese nationals living in Maryland—Haotian Sun and Pengfei Xue—have been convicted of mail fraud and a conspiracy to commit mail fraud for a scheme that involved sending 5,000 counterfeit iPhones to Apple. The pair, who could each face up to 20 years in prison, according to the The Register, hoped Apple would send them real phones in return. The fake phones had “spoofed serial numbers and/or IMEI numbers” to trick Apple stores or authorized service providers into thinking they were genuine. The scam took place between May 2017 and September 2019 and would have cost Apple more than $3 million in losses, a US Department of Justice press release says.

Security researchers from the US and China have created a new side-channel attack that can reconstruct people’s fingerprints from the sounds they create as you swipe them across your phone screen. The researchers used built-in microphones in devices to capture the “faint friction sounds” made by a finger and then used these sounds to create fingerprints. “The attack scenario of PrintListener is extensive and covert,” the researchers write in a paper detailing their work. “It can attack up to 27.9 percent of partial fingerprints and 9.3 percent of complete fingerprints within five attempts.” The research raises concerns about real-world hackers who are attempting to steal people’s biometrics to access bank accounts.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article3 underrated comedy movies that are perfect to watch for the winter
Next Article There’s a big problem with smart rings

Related Articles

Google Messages now lets you review and edit Smart Replies before sending
News

Google Messages now lets you review and edit Smart Replies before sending

10 March 2026
Yann LeCun Raises  Billion to Build AI That Understands the Physical World
News

Yann LeCun Raises $1 Billion to Build AI That Understands the Physical World

10 March 2026
Super Pixel Tech by TCL CSOT could finally end the smartphone display compromises
News

Super Pixel Tech by TCL CSOT could finally end the smartphone display compromises

10 March 2026
Apple’s next MacBook Neo might let you tap the screen
News

Apple’s next MacBook Neo might let you tap the screen

10 March 2026
You can now buy the Asus ROG Cetra Open Wireless earbuds in the US
News

You can now buy the Asus ROG Cetra Open Wireless earbuds in the US

10 March 2026
Humanoid robot offers a peek into a future without chores
News

Humanoid robot offers a peek into a future without chores

10 March 2026
Demo
Top Articles
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024126 Views
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024111 Views
Costco partners with Electric Era to bring back EV charging in the U.S.

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 2024100 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
Fatal Frame II: Crimson Butterfly Remake Review – Frustration Behind The Camera Gaming

Fatal Frame II: Crimson Butterfly Remake Review – Frustration Behind The Camera

News Room10 March 2026
Humanoid robot offers a peek into a future without chores News

Humanoid robot offers a peek into a future without chores

News Room10 March 2026
T-Mobile 5G Home Internet offers  off home internet per month for 5 years and 0 back News

T-Mobile 5G Home Internet offers $20 off home internet per month for 5 years and $300 back

News Room10 March 2026
Most Popular
The Spectacular Burnout of a Solar Panel Salesman

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025137 Views
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024126 Views
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024111 Views
Our Picks
Apple’s next MacBook Neo might let you tap the screen

Apple’s next MacBook Neo might let you tap the screen

10 March 2026
You can now buy the Asus ROG Cetra Open Wireless earbuds in the US

You can now buy the Asus ROG Cetra Open Wireless earbuds in the US

10 March 2026
Fatal Frame II: Crimson Butterfly Remake Review – Frustration Behind The Camera

Fatal Frame II: Crimson Butterfly Remake Review – Frustration Behind The Camera

10 March 2026

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2026 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.