{"id":35455,"date":"2019-09-11T13:07:55","date_gmt":"2019-09-11T17:07:55","guid":{"rendered":"http:\/\/www.andysowards.com\/blog\/?p=35455"},"modified":"2019-09-11T13:07:55","modified_gmt":"2019-09-11T17:07:55","slug":"intruding-truth-chinas-security-ministry-apt17","status":"publish","type":"post","link":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/","title":{"rendered":"Intruding on the Truth: China&#8217;s Security Ministry and APT17"},"content":{"rendered":"<p>When people hear the terms \u201ccyber-espionage\u201d or \u201chacker\u201d, they assume someone in a pullover hoodie, locked in his room, writing a bunch of script in a command prompt, all so they can access someone&#8217;s bank account.\u00a0 However, there are hackers who decide to take the law into their own hands for the good of the people.<\/p>\n<p>One such group is Intrusion Truth, a hacking group dedicated to exposing the cyber-espionage that the Chinese government is guilty of.<\/p>\n<h2><b>The First Sighting\u00a0<\/b><\/h2>\n<p><a href=\"https:\/\/money.cnn.com\/2017\/08\/14\/news\/economy\/trump-china-trade-intellectual-property\/index.html\" rel=\"noopener\" target=\"_blank\"><img decoding=\"async\" data-src=\"https:\/\/andysowards.com\/blog\/assets\/trump-china-trade-intellectual-property-browser-security.jpg\" alt=\"trump-china-trade-intellectual-property-browser-security\" width=\"780\" height=\"439\" class=\"alignnone size-full wp-image-35456 lazyload\" data-srcset=\"https:\/\/andysowards.com\/blog\/assets\/trump-china-trade-intellectual-property-browser-security.jpg 780w, https:\/\/andysowards.com\/blog\/assets\/trump-china-trade-intellectual-property-browser-security-768x432.jpg 768w\" data-sizes=\"(max-width: 780px) 100vw, 780px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 780px; --smush-placeholder-aspect-ratio: 780\/439;\" \/><\/a><\/p>\n<p>Intrusion Truth introduced themselves to the media in their self-titled blog with posts that analyzed <a target=\"_blank\" href=\"https:\/\/intrusiontruth.wordpress.com\/2018\/05\/22\/the-destruction-of-apt3\/\">APT3<\/a>, an \u201cadvanced persistent threat\u201d run by three private citizens under the Chinese security company, Boyusec.<\/p>\n<p>APT3 was responsible for stealing confidential information from Western companies, and Intrusion Truth showed a disdain for this, or any type of, theft.\u00a0 Actually, this crime is the main target of Intrusion Truth.<\/p>\n<p>After their posts and analysis into Boyusec and the three citizens behind it, Boyusec shut down without so much as a whimper, leaving Intrusion Truth victorious.\u00a0 APT3 was over. However, Intrusion Truth was far from done.<\/p>\n<h2><b>Keeping the Steam<\/b><\/h2>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/us-indicts-chinese-hackers-for-corporate-espionage\/\" rel=\"noopener\" target=\"_blank\"><img decoding=\"async\" data-src=\"https:\/\/andysowards.com\/blog\/assets\/us-indicts-chinese-hackers-for-corporate-espionage.png\" alt=\"us-indicts-chinese-hackers-for-corporate-espionage\" width=\"770\" height=\"406\" class=\"alignnone size-full wp-image-35457 lazyload\" data-srcset=\"https:\/\/andysowards.com\/blog\/assets\/us-indicts-chinese-hackers-for-corporate-espionage.png 770w, https:\/\/andysowards.com\/blog\/assets\/us-indicts-chinese-hackers-for-corporate-espionage-768x405.png 768w\" data-sizes=\"(max-width: 770px) 100vw, 770px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 770px; --smush-placeholder-aspect-ratio: 770\/406;\" \/><\/a><br \/>\n<em>US indicts Chinese hackers for corporate espionage<\/em><\/p>\n<p>The deep dive into APT3 happened over the course of 2 months, April to May, in 2017.\u00a0 It was only a year later that Intrusion Truth made a mainstream comeback with their analysis into APT10.<\/p>\n<p>However, this analysis revealed that the Tianjin branch of the Chinese Ministry of State Security was behind the cyber-espionage attacks <a target=\"_blank\" href=\"https:\/\/www.vice.com\/en_us\/article\/wjka84\/intrusion-truth-group-doxing-hackers-chinese-intelligence\">of APT10.<\/a> Not only that, but Intrusion Truth was able to identify multiple individuals in the case.<\/p>\n<p>APT10 was presented as one of the biggest cyber-espionage attacks of Western history, targeting the clients and servers of managed I.T. service providers.<\/p>\n<p>Intrusion Truth&#8217;s work, along with companion FireEye, helped expose the Chinese government&#8217;s illegal actions to the world, but the world remained quiet.\u00a0 Despite the government of one country purposefully <i>stealing information from another, <\/i>the attack barely made headline news.<\/p>\n<p>But Intrusion Truth isn&#8217;t in this for the fame or glory, they&#8217;re in it to keep the Chinese government on their toes, and they&#8217;re in the process of doing this once again with their new posts on APT17.<\/p>\n<h2><b>Sinking Their Teeth<\/b><\/h2>\n<p>Intrusion Truth has made headlines again with their new expos\u00e9 on the Jinan branch of the Chinese Security Ministry, who is now-known to be <a target=\"_blank\" href=\"https:\/\/www.computing.co.uk\/ctg\/news\/3079532\/apt17-china-security-ministry\">the party behind APT17.<\/a><\/p>\n<p>While they claim that the CSM being behind the attack shouldn&#8217;t be surprising, it&#8217;s still a terrifying prospect of what the Chinese government has gotten away with that we <i>don&#8217;t <\/i>know about, yet anyways.<\/p>\n<p>Two of the individuals that Intrusion Truth exposed work directly with the Jinan branch, while the other one lives in the city of Jinan only.<\/p>\n<p>According to them and FireEye, a report like this shouldn&#8217;t be surprising to any cyber security specialist.\u00a0 As the years have passed, China has been culminating a bigger and bigger list of attacks on Western nations, including the theft of confidential information I mentioned earlier.<\/p>\n<h2><b>Fighting the Law<\/b><\/h2>\n<p><a href=\"https:\/\/www.computing.co.uk\/ctg\/news\/3079532\/apt17-china-security-ministry\" rel=\"noopener\" target=\"_blank\"><img decoding=\"async\" data-src=\"https:\/\/andysowards.com\/blog\/assets\/apt17-china-security-ministry.jpg\" alt=\"apt17-china-security-ministry\" width=\"580\" height=\"358\" class=\"alignnone size-full wp-image-35458 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 580px; --smush-placeholder-aspect-ratio: 580\/358;\" \/><\/a><\/p>\n<p>The work of Intrusion Truth represents more than a few citizens who want to better their country.\u00a0 Intrusion Truth represents the new need of citizens having to take the law into their own hands.\u00a0<\/p>\n<p>Now, I&#8217;m not saying you should undergo vigilantism, but there is a dire need for expert hackers to become a vigilante.\u00a0 We&#8217;ve hit a point in our world where governments take action without the transparency that the people demand, where cyber-war is becoming the new norm.<\/p>\n<p>All of this happening while us citizens can only use some <a target=\"_blank\" href=\"https:\/\/www.expressvpn.com\/vpn-software\">VPN software for privacy protection<\/a> and call our government officials, the latter probably doing less than nothing.\u00a0 There is a place in society for the people who do more.\u00a0\u00a0<\/p>\n<p>Intrusion Truth is only one group of the many who are cropping up.\u00a0 There is a global need for cyberheroes to fight the cybercriminals. Will it be enough is the true question.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When people hear the terms \u201ccyber-espionage\u201d or \u201chacker\u201d, they assume someone in a pullover hoodie, locked in his room, writing a bunch of script in a command prompt, all so<\/p>\n","protected":false},"author":1,"featured_media":35458,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[199,1,107],"tags":[6268,2630,3012,10401,10809,6557,6555,6020,10810,10813,5895,1921,3777,352,425,114,1154,456,181,20,1239,177,926,5879,21,10812,5007,6567,5836,5890,9649,677,2493,10811],"class_list":["post-35455","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-geek","category-tech","category-web","tag-anonymous","tag-china","tag-chinese","tag-countries","tag-csm","tag-cyber-attack","tag-cyber-crime","tag-cyber-security","tag-espionage","tag-foreign-affairs","tag-geek","tag-geography","tag-global","tag-hack","tag-hackers","tag-hacks","tag-history","tag-international","tag-internet","tag-it","tag-privacy","tag-security","tag-spy","tag-tech","tag-technology","tag-trade-secrets","tag-u-s","tag-usa","tag-vpn","tag-web","tag-web-security","tag-websites","tag-west","tag-western"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intruding on the Truth: China&#039;s Security Ministry and APT17<\/title>\n<meta name=\"description\" content=\"When people hear the terms \u201ccyber-espionage\u201d or \u201chacker\u201d, they assume someone in a pullover hoodie, locked in his room, writing a bunch of script in a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intruding on the Truth: China&#039;s Security Ministry and APT17\" \/>\n<meta property=\"og:description\" content=\"When people hear the terms \u201ccyber-espionage\u201d or \u201chacker\u201d, they assume someone in a pullover hoodie, locked in his room, writing a bunch of script in a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-11T17:07:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/andysowards.com\/blog\/assets\/apt17-china-security-ministry.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"580\" \/>\n\t<meta property=\"og:image:height\" content=\"358\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/\"},\"author\":{\"name\":\"Andy Sowards\",\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/#\\\/schema\\\/person\\\/9e3197b37c1389a69a23f29ed4dc999d\"},\"headline\":\"Intruding on the Truth: China&#8217;s Security Ministry and APT17\",\"datePublished\":\"2019-09-11T17:07:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/\"},\"wordCount\":673,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/assets\\\/apt17-china-security-ministry.jpg\",\"keywords\":[\"Anonymous\",\"china\",\"chinese\",\"countries\",\"CSM\",\"cyber-attack\",\"cyber-crime\",\"cyber-security\",\"espionage\",\"foreign-affairs\",\"geek\",\"geography\",\"global\",\"hack\",\"hackers\",\"hacks\",\"history\",\"international\",\"internet\",\"IT\",\"privacy\",\"security\",\"spy\",\"Tech\",\"Technology\",\"trade-secrets\",\"U.S.\",\"USA\",\"vpn\",\"web\",\"web-security\",\"websites\",\"west\",\"western\"],\"articleSection\":[\"Geek\",\"Tech\",\"Web\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/\",\"url\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/\",\"name\":\"Intruding on the Truth: China's Security Ministry and APT17\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/assets\\\/apt17-china-security-ministry.jpg\",\"datePublished\":\"2019-09-11T17:07:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/#\\\/schema\\\/person\\\/9e3197b37c1389a69a23f29ed4dc999d\"},\"description\":\"When people hear the terms \u201ccyber-espionage\u201d or \u201chacker\u201d, they assume someone in a pullover hoodie, locked in his room, writing a bunch of script in a\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/#primaryimage\",\"url\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/assets\\\/apt17-china-security-ministry.jpg\",\"contentUrl\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/assets\\\/apt17-china-security-ministry.jpg\",\"width\":580,\"height\":358},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/2019\\\/intruding-truth-chinas-security-ministry-apt17\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intruding on the Truth: China\u00e2\u20ac\u2122s Security Ministry and APT17\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/#\\\/schema\\\/person\\\/9e3197b37c1389a69a23f29ed4dc999d\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2505c3eff66b791c5d294a1459772e38487496aebe3f766f8813bed90b98f1ec?s=96&r=pg\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2505c3eff66b791c5d294a1459772e38487496aebe3f766f8813bed90b98f1ec?s=96&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2505c3eff66b791c5d294a1459772e38487496aebe3f766f8813bed90b98f1ec?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\\\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\\\/\\\/www.andysowards.com\"],\"url\":\"https:\\\/\\\/andysowards.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intruding on the Truth: China's Security Ministry and APT17","description":"When people hear the terms \u201ccyber-espionage\u201d or \u201chacker\u201d, they assume someone in a pullover hoodie, locked in his room, writing a bunch of script in a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/","og_locale":"en_US","og_type":"article","og_title":"Intruding on the Truth: China's Security Ministry and APT17","og_description":"When people hear the terms \u201ccyber-espionage\u201d or \u201chacker\u201d, they assume someone in a pullover hoodie, locked in his room, writing a bunch of script in a","og_url":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2019-09-11T17:07:55+00:00","og_image":[{"width":580,"height":358,"url":"https:\/\/andysowards.com\/blog\/assets\/apt17-china-security-ministry.jpg","type":"image\/jpeg"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/#article","isPartOf":{"@id":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/"},"author":{"name":"Andy Sowards","@id":"https:\/\/andysowards.com\/blog\/#\/schema\/person\/9e3197b37c1389a69a23f29ed4dc999d"},"headline":"Intruding on the Truth: China&#8217;s Security Ministry and APT17","datePublished":"2019-09-11T17:07:55+00:00","mainEntityOfPage":{"@id":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/"},"wordCount":673,"commentCount":0,"image":{"@id":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/#primaryimage"},"thumbnailUrl":"https:\/\/andysowards.com\/blog\/assets\/apt17-china-security-ministry.jpg","keywords":["Anonymous","china","chinese","countries","CSM","cyber-attack","cyber-crime","cyber-security","espionage","foreign-affairs","geek","geography","global","hack","hackers","hacks","history","international","internet","IT","privacy","security","spy","Tech","Technology","trade-secrets","U.S.","USA","vpn","web","web-security","websites","west","western"],"articleSection":["Geek","Tech","Web"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/","url":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/","name":"Intruding on the Truth: China's Security Ministry and APT17","isPartOf":{"@id":"https:\/\/andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/#primaryimage"},"image":{"@id":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/#primaryimage"},"thumbnailUrl":"https:\/\/andysowards.com\/blog\/assets\/apt17-china-security-ministry.jpg","datePublished":"2019-09-11T17:07:55+00:00","author":{"@id":"https:\/\/andysowards.com\/blog\/#\/schema\/person\/9e3197b37c1389a69a23f29ed4dc999d"},"description":"When people hear the terms \u201ccyber-espionage\u201d or \u201chacker\u201d, they assume someone in a pullover hoodie, locked in his room, writing a bunch of script in a","breadcrumb":{"@id":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/#primaryimage","url":"https:\/\/andysowards.com\/blog\/assets\/apt17-china-security-ministry.jpg","contentUrl":"https:\/\/andysowards.com\/blog\/assets\/apt17-china-security-ministry.jpg","width":580,"height":358},{"@type":"BreadcrumbList","@id":"https:\/\/andysowards.com\/blog\/2019\/intruding-truth-chinas-security-ministry-apt17\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Intruding on the Truth: China\u00e2\u20ac\u2122s Security Ministry and APT17"}]},{"@type":"WebSite","@id":"https:\/\/andysowards.com\/blog\/#website","url":"https:\/\/andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/andysowards.com\/blog\/#\/schema\/person\/9e3197b37c1389a69a23f29ed4dc999d","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2505c3eff66b791c5d294a1459772e38487496aebe3f766f8813bed90b98f1ec?s=96&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/2505c3eff66b791c5d294a1459772e38487496aebe3f766f8813bed90b98f1ec?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2505c3eff66b791c5d294a1459772e38487496aebe3f766f8813bed90b98f1ec?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/35455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=35455"}],"version-history":[{"count":1,"href":"https:\/\/andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/35455\/revisions"}],"predecessor-version":[{"id":35459,"href":"https:\/\/andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/35455\/revisions\/35459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/andysowards.com\/blog\/wp-json\/wp\/v2\/media\/35458"}],"wp:attachment":[{"href":"https:\/\/andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=35455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=35455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=35455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}