
Li Xiaoyu Wiki – Li Xiaoyu Biography
These “two Chinese hackers were working with the Chinese Ministry of State Security,” John Demers, responsible for national security issues at the ministry, told a press conference. According to US authorities, Li Xiaoyu, 34, and Dong Jiazhi, 33, met while studying engineering and stole trade secrets estimated at several hundred thousand dollars over a decade.
Li Xiaoyu Age
He is 34 years old.
Li Xiaoyu Wanted By The FBI
The two men, who were not arrested and are a priori in China, operated for their own profit but “sometimes also worked for the Chinese government”, according to Mr. Demers.
The US Department of Justice announced Tuesday the indictment of two Chinese accused of carrying out a series of computer attacks, in particular against companies engaged in the search for a vaccine against Covid-19.
Beyond the attacks against companies in ten Western countries, including Australia, the United Kingdom and Belgium, they have also targeted “non-governmental organizations, religious and pro-democracy and rights activists of Man in the United States, in China and in Hong Kong, “he added.
Recently, they attacked Californian companies that were working to find vaccines, treatments or tests for the new coronavirus, according to federal prosecutor in charge of the case, William Hyslop.
On May 13, the US federal police and the cybersecurity agency issued a rare warning to US researchers working on the new coronavirus to warn them of the risk of Chinese hacking, which Beijing strongly denied.
On July 7, FBI Director Christopher Wray reiterated the accusations. “At this very moment, China is working to compromise (…) American research on Covid-19”, he assured.
The government of Donald Trump has adopted in recent months a very critical tone towards China, accused by the president of having concealed the extent of the spread of the new coronavirus when it appeared in the center of the country at the end of 2019 .
Investigation
Our Cyber Division researchers and analysts show results not only on hackers, but also on individuals and institutions that direct these hackers and facilitate their actions in field offices across the country. The indictments are just one way we can do this. I am proud of the perseverance of FBI agents and analysts, as well as the US lawyers who continue to persecute these perpetrators.
By denoting Dong and Li, we condemn their actions and the actions of MSS officers in the Guangdong Province Security Department and those who provide them financial support and direction.
Unfortunately, China does not just use hackers to target R&D or intellectual property. As we have shown in the indictment, China is willing to use the cyber capabilities of intelligence services to target Chinese opponents outside China and protesters who support democracy and human rights in Hong Kong.
I want to touch on an important point, which is the same thing I mentioned earlier: Our concern is not with Chinese people or Chinese Americans, especially with the Chinese government and the Chinese Communist Party. The effective confrontation of this threat does not mean that we should not do business with the Chinese, host Chinese students, host Chinese visitors or coexist with China as a country on the world stage. This means that when China violates our criminal laws and international norms, we will not tolerate it. We will hold people accountable. To combat this threat every day, we will use our unique authorities, experiences and talents at home and with the help of our partners around the world.