Menu Home

EU, OFSI update two Cyber-Attacks listings

Pursuant to Council Implementing Regulation (EU) 2020/1744, UK officials amended the following individual designations:

1. GAO,Qiang
DOB: 04/10/1983. POB: Shandong Province, China Nationality: Chinese Address: Room 1102, Guanfu Mansion, 46 Xinkai Road, Hedong District, Tianjin, China. Other Information: Gender: male. Gao Qiang is involved in “Operation Cloud Hopper”, a series of cyber-attacks. “Operation Cloud Hopper” targeted information systems of multinational companies in six continents, including companies located in the European Union, and gained unauthorised access to commercially sensitive data, resulting in significant economic loss. The actor publicly known as “APT10” (“Advanced Persistent Threat 10”) (a.k.a. “Red Apollo”, “CVNX”, “Stone Panda”, “MenuPass” and “Potassium”) carried out “Operation Cloud Hopper”. Gao Qiang can be linked to APT10, including through his association with APT10 command and control infrastructure. Moreover, Huaying Haitai, an entity designated for providing support to and facilitating “Operation Cloud Hopper”, employed Gao Qiang. He has links with Zhang Shilong, who is also designated in connection with “Operation Cloud Hopper”. Gao Qiang is therefore associated with both Huaying Haitai and Zhang Shilong. Listed on: 31/07/2020 Last Updated: 31/07/2020 24/11/2020 Group ID: 13903.
2. ZHANG,Shilong
DOB: 10/09/1981. POB: China Nationality: Chinese Address: Hedong, Yuyang Road No 121, Tianjin, China. Other Information: Gender: male. Zhang Shilong is involved in “Operation Cloud Hopper”, a series of cyber‐attacks. “Operation Cloud Hopper” has targeted information systems of multinational companies in six continents, including companies located in the European Union, and gained unauthorised access to commercially sensitive data, resulting in significant economic loss. The actor publicly known as “APT10” (“Advanced Persistent Threat 10”) (a.k.a. “Red Apollo”, “CVNX”, “Stone Panda”, “MenuPass” and “Potassium”) carried out “Operation Cloud Hopper”. Zhang Shilong can be linked to APT10, including through the malware he developed and tested in connection with the cyber-attacks carried out by APT10. Moreover, Huaying Haitai, an entity designated for providing support to and facilitating “Operation Cloud Hopper”, employed Zhang Shilong. He has links with Gao Qiang, who is also designated in connection
with “Operation Cloud Hopper”. Zhang Shilong is therefore associated with both Huaying Haitai and Gao Qiang. Listed on: 31/07/2020 Last Updated: 31/07/2020 24/11/2020 Group ID: 13904.

made under the Cyber-Attacks sanctions program.

Links:

OFSI Notice

Council Implementing Regulation (EU) 2020/1744

Categories: Cyber sanctions EU Updates OFSI Updates Sanctions Lists

eric9to5

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: