CrimeOwl AI logoCrimeOwl AI
CasesBlogPricingAbout
  1. Home
  2. /
  3. Cases
  4. /
  5. APT 10 GROUP
Back to CasesMore Cases
APT 10 GROUP - Case Investigation | CrimeOwl AI
Multiple victims: 45+ commercial and defense technology companies, managed service providers, U.S. government agencies, and 100,000+ Navy personnel

The person at the center of this case

Multiple victims: 45+ commercial and defense technology companies, managed service providers, U.S. government agencies, and 100,000+ Navy personnel

Case
#783
SourceFBI WantedUpdated Mar 15, 2026
United States District Court for the Southern District of New York; Federal Bureau of Investigation
Cold Case · Open
7 years waiting · since 2018

APT 10 GROUP

Justice for Multiple victims: 45+ commercial and defense technology companies, managed service providers, U.S. government agencies, and 100,000+ Navy personnel — the trail went cold in 2018, but the truth hasn't.

Start here

Key leads to think about

🎯
suspect
Lead #1

How were ZHU HUA and ZHANG SHILONG identified and located despite operating from China with state security backing?

🔍
evidence
Lead #2

What specific intellectual property and confidential information was stolen from the 45+ targeted companies and how was it recovered or mitigated?

📍
location
Lead #3

How did APT 10 compromise managed service providers in 12 countries to gain access to multiple downstream victims?

On December 17, 2018, a federal grand jury indicted ZHU HUA and ZHANG SHILONG, two members of the Chinese hacking group APT 10, for conspiracy to commit computer intrusions, wire fraud, and identity theft. From 2006 through 2018, the defendants conducted extensive global cyberattacks targeting over 45 commercial and defense technology companies, managed service providers, and U.S. government agencies, stealing intellectual property and compromising data from systems in at least 12 countries. The case remains significant as an ongoing investigation into state-sponsored cyber espionage operations affecting critical infrastructure, defense technology, and the personal information of over 100,000 Navy personnel.

Case
#783
SourceFBI WantedUpdated Mar 15, 2026
United States District Court for the Southern District of New York; Federal Bureau of Investigation

Try asking

Claim this imported case

A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.

10 uploads25 AI questions/day

This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.

More leads to consider

Beyond the top three above — each detail below could be the thread that pulls this case open.

💡
clue
Lead #4

What operational security measures allowed APT 10 to conduct intrusions for 12 years before indictment, and are similar campaigns still ongoing?

👤
person
Lead #5

What is the current status and whereabouts of ZHU HUA and ZHANG SHILONG, and have they been extradited or apprehended?

Have information about any of these leads?

Even the smallest detail could be the key to solving this case.

Official wording

Source Narrative

Conspiracy to Commit Computer Intrusions; Conspiracy to Commit Wire Fraud; Aggravated Identity Theft On December 17, 2018, a grand jury in the United States District Court for the Southern District of New York indicted ZHU HUA , aka “Afwar,” aka “CVNX,” aka “Alayos,” aka “Godkiller,” and ZHANG SHILONG , aka “Baobeilong,” aka “Zhang Jianguo,” aka “Atreexp," two members of a hacking group operating in China known in the cybersecurity community as Advanced Persistent Threat 10 (the “APT 10 Group”), with conspiracy to commit computer intrusion, conspiracy to commit wire fraud, and aggravated identity theft. The defendants worked for Huaying Haitai Science and Technology Development Company located in Tianjin, China, and they acted in association with the Chinese Ministry of State Security’s Tianjin State Security Bureau.

As alleged in the Indictment, from at least 2006 through 2018, the defendants conducted extensive campaigns of global intrusions into computer systems aiming to steal, among other data, intellectual property and confidential business and technological information from more than at least 45 commercial and defense technology companies in at least a dozen states, managed service providers (“MSP”), which are companies that remotely manage the information technology infrastructure of businesses and governments around the world, and U.S. government agencies.

The victim companies targeted by ZHU HUA and ZHANG SHILONG were involved in a diverse array of commercial activity, industries, and technologies, including aviation, space and satellite technology, manufacturing technology, oil and gas exploration, production technology, communications technology, computer processor technology, and maritime technology. In addition, for example, the APT 10 Group’s campaign compromised the data of an MSP and certain of its clients located in at least 12 countries including Brazil, Canada, Finland, France, Germany, India, Japan, Sweden, Switzerland, the United Arab Emirates, the United Kingdom, and the United States.

The APT 10 group also compromised computer systems containing information regarding the United States Department of the Navy and stole the personally identifiable information of more than 100,000 Navy personnel.

Timeline of Events

🕵️
2006

Campaign begins

APT 10 Group begins extensive global intrusion campaigns targeting commercial and defense technology companies

🕵️
2018-12-17

Federal indictment

Grand jury in U.S. District Court for the Southern District of New York indicts ZHU HUA and ZHANG SHILONG on charges of conspiracy to commit computer intrusions, wire fraud, and aggravated identity theft

Key Locations
Interactive map showing important locations related to this case

Case Information

Incident:January 1, 2006
Last Updated:April 29, 2026

Leave a comment

Comments

Case Information

Incident:January 1, 2006
Last Updated:April 29, 2026