CrimeOwl AI logoCrimeOwl AI
CasesBlogPricingAbout
  1. Home
  2. /
  3. Cases
  4. /
  5. YIN KECHENG
Back to CasesMore Cases
Multiple victims worldwide (corporate and government networks)

The person at the center of this case

Multiple victims worldwide (corporate and government networks)

Case
#936
SourceFBI WantedUpdated Mar 15, 2026
Federal Bureau of Investigation (FBI); U.S. District Court for the District of Columbia
Cold Case · Open
48 days waiting

YIN KECHENG

Justice for Multiple victims worldwide (corporate and government networks) — the trail went cold in 2026, but the truth hasn't.

Start here

Key leads to think about

🎯
suspect
Lead #1

Why has Yin Kecheng evaded capture in Shanghai despite two federal indictments and international law enforcement attention?

🔍
evidence
Lead #2

What specific vulnerabilities and malware variants were used to compromise networks, and can they help identify other victims?

📞
contact
Lead #3

Who were the customers purchasing stolen data, and how many had direct connections to PRC government agencies?

Yin Kecheng is wanted for his alleged involvement in a sophisticated international cybercrime conspiracy spanning 2013-2020, in which he and co-conspirators compromised networks, stole sensitive data, and sold it to customers including Chinese government agencies. Working with Zhou Shuai and others, Kecheng allegedly exploited network vulnerabilities, installed persistent malware like PlugX, and exfiltrated stolen data to servers under their control. Despite indictments in 2018 and 2023, Kecheng remains at large and is believed to be in Shanghai, China, making this case a significant ongoing concern for international cybersecurity and law enforcement.

Case
#936
SourceFBI WantedUpdated Mar 15, 2026
Federal Bureau of Investigation (FBI); U.S. District Court for the District of Columbia

Try asking

Claim this imported case

A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.

10 uploads25 AI questions/day

This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.

More leads to consider

Beyond the top three above — each detail below could be the thread that pulls this case open.

👤
person
Lead #4

What is the current operational status of Zhou Shuai and i-Soon, and are they still active in data brokering?

💡
clue
Lead #5

What servers under their control still exist, and can they be located and seized for evidence?

Have information about any of these leads?

Even the smallest detail could be the key to solving this case.

Official wording

Source Narrative

Conspiracy to Cause Damage To, and Obtain Information By Unauthorized Access To, Protected Computers, to Commit Wire Fraud, and to Commit Aggravated Identity Theft; Wire Fraud; Obtaining Information by Unauthorized Access to Protected Computers; Intentionally Causing Damage to Protected Computers; Aggravated Identity Theft; Money Laundering Caution: Yin Kecheng and Zhou Shuai are wanted for their alleged involvement in compromising and stealing data belonging to scores of victims around the world. The men, and their co-conspirators, allegedly exploited vulnerabilities in victim networks, conducted reconnaissance once inside those networks, and installed malware, such as PlugX malware, that provided persistent access.

The men then allegedly identified and stole data from the compromised networks by exfiltrating it to servers under their control. They also allegedly brokered stolen data for sale and provided it to various customers, only some of whom had connections to the PRC government and military.

Zhou Shuai allegedly sold data stolen by Yin Kecheng through i-Soon, a company whose primary customers included the PRC Ministry of State Security (MSS) and the Ministry of Public Safety (MPS). In 2018 and 2023, Grand Juries in the District of Columbia returned indictments against Yin Kecheng on multiple charges related to criminal activity occurring between 2013 and 2020.

Remarks: Yin Kecheng was last known to reside in Shanghai, China.

Timeline of Events

🕵️
2013

Criminal activity begins

Alleged unauthorized access and data theft conspiracy begins

🕵️
2018

First indictment

Grand Jury in the District of Columbia returns indictment against Yin Kecheng

🕵️
2020

Criminal activity ends

Alleged criminal activity period concludes

🕵️
2023

Second indictment

Grand Jury in the District of Columbia returns additional indictment against Yin Kecheng

Key Locations
Interactive map showing important locations related to this case

Case Information

Incident:January 1, 2013
Last Updated:April 29, 2026

Up to $2,000,000 Reward

For information leading to the resolution of this case

Leave a comment

Comments

Case Information

Incident:January 1, 2013
Last Updated:April 29, 2026

Up to $2,000,000 Reward

For information leading to the resolution of this case