CrimeOwl AI logoCrimeOwl AI
CasesBlogPricingAbout
  1. Home
  2. /
  3. Cases
  4. /
  5. ZHU HUA
Back to CasesMore Cases
Multiple commercial, defense, and government entities; 100,000+ U.S. Navy personnel

The person at the center of this case

Multiple commercial, defense, and government entities; 100,000+ U.S. Navy personnel

Case
#858
SourceFBI WantedUpdated Mar 15, 2026
United States District Court for the Southern District of New York; Federal Bureau of Investigation
Cold Case · Open
7 years waiting · since 2018

ZHU HUA

Justice for Multiple commercial, defense, and government entities; 100,000+ U.S. Navy personnel — the trail went cold in 2018, but the truth hasn't.

Start here

Key leads to think about

🎯
suspect
Lead #1

What is the current location and status of ZHU HUA and ZHANG SHILONG, and are extradition efforts ongoing?

🔍
evidence
Lead #2

How were the defendants identified and what technical forensics linked them to the APT 10 Group operations?

💡
clue
Lead #3

Which of the 45+ targeted companies have publicly disclosed their breach details, and what specific intellectual property was stolen?

On December 17, 2018, a federal grand jury indicted ZHU HUA and ZHANG SHILONG, members of the Chinese hacking group APT 10, for conspiracy to commit computer intrusions, wire fraud, and identity theft. From 2006 to 2018, the defendants conducted extensive cyberattacks targeting over 45 commercial and defense technology companies, managed service providers, and U.S. government agencies across multiple countries to steal intellectual property and sensitive data. The case remains significant as an ongoing investigation into state-sponsored cyber espionage affecting critical infrastructure, defense systems, and the personal information of over 100,000 Navy personnel.

Case
#858
SourceFBI WantedUpdated Mar 15, 2026
United States District Court for the Southern District of New York; Federal Bureau of Investigation

Try asking

Claim this imported case

A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.

10 uploads25 AI questions/day

This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.

More leads to consider

Beyond the top three above — each detail below could be the thread that pulls this case open.

⏰
timeline
Lead #4

How did the intrusion methods and targets evolve from 2006 through 2018, and were there periods of increased activity?

📞
contact
Lead #5

What coordination existed between Huaying Haitai and the Chinese Ministry of State Security's Tianjin bureau?

Have information about any of these leads?

Even the smallest detail could be the key to solving this case.

Official wording

Source Narrative

Conspiracy to Commit Computer Intrusions; Conspiracy to Commit Wire Fraud; Aggravated Identity Theft Caution: On December 17, 2018, a grand jury in the United States District Court for the Southern District of New York indicted ZHU HUA, aka “Afwar,” aka “CVNX,” aka “Alayos,” aka “Godkiller,” and ZHANG SHILONG , aka “Baobeilong,” aka “Zhang Jianguo,” aka “Atreexp," two members of a hacking group operating in China known in the cybersecurity community as Advanced Persistent Threat 10 (the “ APT 10 Group ”), with conspiracy to commit computer intrusion, conspiracy to commit wire fraud, and aggravated identity theft. The defendants worked for Huaying Haitai Science and Technology Development Company located in Tianjin, China, and they acted in association with the Chinese Ministry of State Security’s Tianjin State Security Bureau.

As alleged in the Indictment, from at least 2006 through 2018, the defendants conducted extensive campaigns of global intrusions into computer systems aiming to steal, among other data, intellectual property and confidential business and technological information from more than at least 45 commercial and defense technology companies in at least a dozen states, managed service providers (“MSP”), which are companies that remotely manage the information technology infrastructure of businesses and governments around the world, and U.S. government agencies.

The victim companies targeted by ZHU HUA and ZHANG SHILONG were involved in a diverse array of commercial activity, industries, and technologies, including aviation, space and satellite technology, manufacturing technology, oil and gas exploration, production technology, communications technology, computer processor technology, and maritime technology. In addition, for example, the APT 10 Group’s campaign compromised the data of an MSP and certain of its clients located in at least 12 countries including Brazil, Canada, Finland, France, Germany, India, Japan, Sweden, Switzerland, the United Arab Emirates, the United Kingdom, and the United States.

The APT 10 group also compromised computer systems containing information regarding the United States Department of the Navy and stole the personally identifiable information of more than 100,000 Navy personnel.

Timeline of Events

🕵️
2006

Campaign begins

Defendants began conducting extensive computer intrusion campaigns targeting commercial and defense technology companies

🕵️
2018-12-17

Federal indictment

Grand jury in U.S. District Court for the Southern District of New York indicted ZHU HUA and ZHANG SHILONG for conspiracy to commit computer intrusions, wire fraud, and aggravated identity theft

Key Locations
Interactive map showing important locations related to this case

Case Information

Incident:January 1, 2006
Last Updated:April 29, 2026

Leave a comment

Comments

Case Information

Incident:January 1, 2006
Last Updated:April 29, 2026