CrimeOwl AI logoCrimeOwl AI
CasesBlogPricingAbout
  1. Home
  2. /
  3. Cases
  4. /
  5. JIANG LIZHI
Back to CasesMore Cases
Multiple international organizations and companies across telecommunications, government, defense, education, and manufacturing sectors

The person at the center of this case

Multiple international organizations and companies across telecommunications, government, defense, education, and manufacturing sectors

Case
#766
SourceFBI WantedUpdated Mar 15, 2026
Federal Bureau of Investigation (FBI); U.S. Department of Justice; District of Columbia Grand Jury
Cold Case · Open
5 years waiting · since 2020

JIANG LIZHI

Justice for Multiple international organizations and companies across telecommunications, government, defense, education, and manufacturing sectors — the trail went cold in 2020, but the truth hasn't.

Start here

Key leads to think about

🎯
suspect
Lead #1

What is JIANG Lizhi's current location and operational status within APT 41?

🔍
evidence
Lead #2

What specific supply chain attack methodologies were used to compromise hundreds of global companies?

📍
location
Lead #3

How extensively was Chengdu 404 Network Technology Company involved in coordinating these international cyber operations?

On August 11, 2020, a federal grand jury in Washington, D.C. indicted Chinese national JIANG Lizhi and two co-conspirators for their roles in a sophisticated international cybercriminal enterprise known as APT 41 and BARIUM. Operating from Chengdu 404 Network Technology Company, the defendants allegedly conducted supply chain attacks targeting hundreds of companies across telecommunications, government, defense, education, and manufacturing sectors in at least 12 countries. The case remains active as authorities seek to locate and apprehend JIANG Lizhi, whose whereabouts and current activities are unknown.

Case
#766
SourceFBI WantedUpdated Mar 15, 2026
Federal Bureau of Investigation (FBI); U.S. Department of Justice; District of Columbia Grand Jury

Try asking

Claim this imported case

A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.

10 uploads25 AI questions/day

This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.

More leads to consider

Beyond the top three above — each detail below could be the thread that pulls this case open.

💡
clue
Lead #4

What connections exist between the defendants and Chinese state-sponsored cyber operations?

📞
contact
Lead #5

Which international law enforcement agencies are actively cooperating to locate and apprehend JIANG Lizhi?

Have information about any of these leads?

Even the smallest detail could be the key to solving this case.

Official wording

Source Narrative

Racketeering Conspiracy; Conspiracy; Identity Theft; Aggravated Identity Theft; Access Device Fraud; Obtaining Information by Unauthorized Access to Protected Computers; Intentionally Causing Damage to Protected Computers; Threatening to Damage a Protected Computer; Money Laundering Caution: JIANG Lizhi is part of a Chinese hacking group known as APT 41 and BARIUM. On August 11, 2020, a Grand Jury in the District of Columbia returned an indictment against Chinese nationals JIANG Lizhi, QIAN Chuan , and FU Qiang on multiple charges including Racketeering Conspiracy; Conspiracy; Identity Theft; Aggravated Identity Theft; Access Device Fraud; Obtaining Information by Unauthorized Access to Protected Computers; Intentionally Causing Damage to Protected Computers; Threatening to Damage a Protected Computer; and Money Laundering.

These charges stem from their alleged unauthorized computer intrusions while employed by Chengdu 404 Network Technology Company. The defendants allegedly conducted supply chain attacks to gain unauthorized access to networks throughout the world, targeting hundreds of companies representing a broad array of industries to include: social media, telecommunications, government, defense, education, and manufacturing.

These victims included companies in Australia, Brazil, Germany, India, Japan and Sweden. The defendants allegedly targeted telecommunications providers in the United States, Australia, China (Tibet), Chile, India, Indonesia, Malaysia, Pakistan, Singapore, South Korea, Taiwan, and Thailand.

The defendants allegedly deployed ransomware attacks and demanded payments from victims. Remarks: JIANG Lizhi has ties to Chengdu, China.

Timeline of Events

🕵️
2020-08-11

Federal Indictment Returned

Grand Jury in the District of Columbia returned indictment against JIANG Lizhi, QIAN Chuan, and FU Qiang on multiple charges including racketeering conspiracy, identity theft, unauthorized computer access, and money laundering

Key Locations
Interactive map showing important locations related to this case

Case Information

Incident:August 11, 2020
Last Updated:April 29, 2026

Leave a comment

Comments

Case Information

Incident:August 11, 2020
Last Updated:April 29, 2026