Those cheap digital item keys you bought might have been swiped by the Chinese government
Say it ain’t so…
We’ve all seen the reports of the legalities of gray market digital goods markets like G2A or Kinguin, and now at least, some of those claims seem to have a basis in fact.
APT41 is a Chinese government-backed hacking group who has been stealing intellectual-property (IP) from the medical device and pharma industries since 2012. It’s also got a side gig – hacking the video game market for personal gain.
APT41 was making cash on the side by hacking video-game supply chains
The report in the MIT Technology Review references another report from American cybersecurity firm FireEye.
In it, the Chinese-sponsored hacking group is linked to IP thefts, supply chain compromises at companies such as Asus, and other hacks under the supervision of Beijing. It also links the group to some extra-curricular activities, where they hacked for personal profit. The target? The supply chain of digital codes for virtual currency from popular online games, as well as more traditional ransomware + extortion combos.
- Created in 2012, APT41 has also been known as Barium and Winnti
- The group changed targeting tactics after American president Barack Obama and Chinese president Xi Jinping came to an agreement about IP theft in 2015
The virtual currency hacks likely earned it tens of millions of dollars, with the keys sold on underground markets. It’s also likely that some of those keys found their way onto gray market sites, where unsuspecting customers purchased what they thought were legitimate codes.
- IFA 2019 is coming – here’s what to expect
- Samsung quietly removed its ads throwing shade at the iPhone
- This Chrome extension gives you the old Twitter layout back
- Samsung announced a 108-megapixel camera sensor that no one needs