The person at the center of this case
Multiple international organizations and companies across telecommunications, government, defense, education, and manufacturing sectors
Justice for Multiple international organizations and companies across telecommunications, government, defense, education, and manufacturing sectors — the trail went cold in 2020, but the truth hasn't.
Start here
What is JIANG Lizhi's current location and operational status within APT 41?
What specific supply chain attack methodologies were used to compromise hundreds of global companies?
How extensively was Chengdu 404 Network Technology Company involved in coordinating these international cyber operations?
On August 11, 2020, a federal grand jury in Washington, D.C. indicted Chinese national JIANG Lizhi and two co-conspirators for their roles in a sophisticated international cybercriminal enterprise known as APT 41 and BARIUM. Operating from Chengdu 404 Network Technology Company, the defendants allegedly conducted supply chain attacks targeting hundreds of companies across telecommunications, government, defense, education, and manufacturing sectors in at least 12 countries. The case remains active as authorities seek to locate and apprehend JIANG Lizhi, whose whereabouts and current activities are unknown.
Try asking
A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.
This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.
Beyond the top three above — each detail below could be the thread that pulls this case open.
What connections exist between the defendants and Chinese state-sponsored cyber operations?
Which international law enforcement agencies are actively cooperating to locate and apprehend JIANG Lizhi?
Even the smallest detail could be the key to solving this case.
Official wording
Racketeering Conspiracy; Conspiracy; Identity Theft; Aggravated Identity Theft; Access Device Fraud; Obtaining Information by Unauthorized Access to Protected Computers; Intentionally Causing Damage to Protected Computers; Threatening to Damage a Protected Computer; Money Laundering Caution: JIANG Lizhi is part of a Chinese hacking group known as APT 41 and BARIUM. On August 11, 2020, a Grand Jury in the District of Columbia returned an indictment against Chinese nationals JIANG Lizhi, QIAN Chuan , and FU Qiang on multiple charges including Racketeering Conspiracy; Conspiracy; Identity Theft; Aggravated Identity Theft; Access Device Fraud; Obtaining Information by Unauthorized Access to Protected Computers; Intentionally Causing Damage to Protected Computers; Threatening to Damage a Protected Computer; and Money Laundering.
These charges stem from their alleged unauthorized computer intrusions while employed by Chengdu 404 Network Technology Company. The defendants allegedly conducted supply chain attacks to gain unauthorized access to networks throughout the world, targeting hundreds of companies representing a broad array of industries to include: social media, telecommunications, government, defense, education, and manufacturing.
These victims included companies in Australia, Brazil, Germany, India, Japan and Sweden. The defendants allegedly targeted telecommunications providers in the United States, Australia, China (Tibet), Chile, India, Indonesia, Malaysia, Pakistan, Singapore, South Korea, Taiwan, and Thailand.
The defendants allegedly deployed ransomware attacks and demanded payments from victims. Remarks: JIANG Lizhi has ties to Chengdu, China.
Grand Jury in the District of Columbia returned indictment against JIANG Lizhi, QIAN Chuan, and FU Qiang on multiple charges including racketeering conspiracy, identity theft, unauthorized computer access, and money laundering