APT-doxing group revealed identities of alleged hackers behind Chinese-linked APT17 cyber-espionage outfit

APT-doxing group revealed identities of alleged hackers behind Chinese-linked APT17 cyber-espionage outfit

In its latest series of exposés the anonymous white-hat group Intrusion Truth has revealed the secret identities of individuals it claims are behind APT17 cyber-espionage group. APT17 (also known as Deputy Dog and Axiom) is a China-based hacking group, which is thought to be responsible for multiple cyberattacks against various organizations – from private companies to government entities all over the world.

According to Intrusion Truth, one of the members is a man called Guo Lin, who is believed to be an officer of the Chinese Ministry of State Security (MSS). He also appears to have links to four Chinese tech companies namely Jinan Quanxin Fangyuan Technology, Jinan Anchuang Information Technology, Jinan Fanglang Information Technology and RealSOI Computer Network Technology.

Two other members of APT17 are Wang Qingwei and Zeng Xiaoyong, according to Intrusion Truth. Wang Qingwei is a representative of the Jinan Fanglang company while Zeng Xiaoyong goes online under an alias of “envymask” and is a well-known member of Chinese hacking circles and is a member of the ph4nt0m group, Intrusion Truth claims.

All three of above-mentioned individuals live in the city of Jinan, the capital of Shandong province, and supposedly work as contractors for the Jinan bureau of the MSS conducting hacking operations on behalf of MSS.

It is not the first time when APT-doxing group exposed the identities of members of various hacking groups. In May 2017 and August 2018 Intrusion Truth identified several hackers involved in cyber operations carried out by Chinese-linked APT groups namely APT10 (Cloud Hopper) and APT3.

 

Back to the list

Latest Posts

Cyber Security Week in Review: May 2, 2025

Cyber Security Week in Review: May 2, 2025

In brief: SonicWall warns of active exploitation of recently patched bugs, Commvault confirms a nation-state zero-day attack, and more.
2 May 2025
Nation-state hackers exploit zero-day in Commvault Azure environment

Nation-state hackers exploit zero-day in Commvault Azure environment

Additionally, SonicWall has warned that two flaws affecting its SMA100 appliances are being actively exploited in the wild.
1 May 2025
New crypto exchange Grinex suspected to be Garantex rebrand following US seizure

New crypto exchange Grinex suspected to be Garantex rebrand following US seizure

After Garantex’s domains were seized, Grinex was immediately promoted in Telegram channels.
30 April 2025