The person at the center of this case
Multiple victims worldwide (corporate and government networks)
Justice for Multiple victims worldwide (corporate and government networks) — the trail went cold in 2026, but the truth hasn't.
Start here
Why has Yin Kecheng evaded capture in Shanghai despite two federal indictments and international law enforcement attention?
What specific vulnerabilities and malware variants were used to compromise networks, and can they help identify other victims?
Who were the customers purchasing stolen data, and how many had direct connections to PRC government agencies?
Yin Kecheng is wanted for his alleged involvement in a sophisticated international cybercrime conspiracy spanning 2013-2020, in which he and co-conspirators compromised networks, stole sensitive data, and sold it to customers including Chinese government agencies. Working with Zhou Shuai and others, Kecheng allegedly exploited network vulnerabilities, installed persistent malware like PlugX, and exfiltrated stolen data to servers under their control. Despite indictments in 2018 and 2023, Kecheng remains at large and is believed to be in Shanghai, China, making this case a significant ongoing concern for international cybersecurity and law enforcement.
Try asking
A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.
This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.
Beyond the top three above — each detail below could be the thread that pulls this case open.
What is the current operational status of Zhou Shuai and i-Soon, and are they still active in data brokering?
What servers under their control still exist, and can they be located and seized for evidence?
Even the smallest detail could be the key to solving this case.
Official wording
Conspiracy to Cause Damage To, and Obtain Information By Unauthorized Access To, Protected Computers, to Commit Wire Fraud, and to Commit Aggravated Identity Theft; Wire Fraud; Obtaining Information by Unauthorized Access to Protected Computers; Intentionally Causing Damage to Protected Computers; Aggravated Identity Theft; Money Laundering Caution: Yin Kecheng and Zhou Shuai are wanted for their alleged involvement in compromising and stealing data belonging to scores of victims around the world. The men, and their co-conspirators, allegedly exploited vulnerabilities in victim networks, conducted reconnaissance once inside those networks, and installed malware, such as PlugX malware, that provided persistent access.
The men then allegedly identified and stole data from the compromised networks by exfiltrating it to servers under their control. They also allegedly brokered stolen data for sale and provided it to various customers, only some of whom had connections to the PRC government and military.
Zhou Shuai allegedly sold data stolen by Yin Kecheng through i-Soon, a company whose primary customers included the PRC Ministry of State Security (MSS) and the Ministry of Public Safety (MPS). In 2018 and 2023, Grand Juries in the District of Columbia returned indictments against Yin Kecheng on multiple charges related to criminal activity occurring between 2013 and 2020.
Remarks: Yin Kecheng was last known to reside in Shanghai, China.
Alleged unauthorized access and data theft conspiracy begins
Grand Jury in the District of Columbia returns indictment against Yin Kecheng
Alleged criminal activity period concludes
Grand Jury in the District of Columbia returns additional indictment against Yin Kecheng
For information leading to the resolution of this case
For information leading to the resolution of this case