China has Unveiled the Teams of of Hackers for Cyberwar

China has confessed to the existence of special cyber warfare units as intimidation between a nation and United States over cyber espionage continues to rise.

China has been the aim of suspicion relating to high-profile cyberattacks and state-sponsored campaigns for a long time. The nation has continually denied that the groups of military hackers exist who were believed to direct these attacks. However, this time, China has officially imparted the existence of military cyber warfare units — in fact, the state sponsors a series of them who specialize in different areas.

China revealed its hacking team for cyberwar fare

The disclosures of China’s digital war tactics are presented in the latest edition of publication The Science of Military Strategy, which is generated by China’s People’s Liberation Army (PLA) once in a blue moon. Joe McReynolds, a researcher of China’s network warfare and capabilities for the US Center for Intelligence Research and Analysis, told The Daily Beast 

“this is the first time we’ve seen an explicit acknowledgement of the existence of China’s secretive cyber warfare forces from the Chinese side.”

While addressing to the publication, McReynolds said the unmasking is the first time cyber warfare capabilities have been admitted to on both the military and civilian-government sides.

Deniability, naturally, has now been lost — and whether China’s denial was ever believed in the first place is now a moot point. McReynolds commented:

“It means that the Chinese have discarded their fig leaf of quasi-plausible deniability. As recently as 2013, official PLA publications have issued blanket denials such as, ‘The Chinese military has never supported any hacker attack or hacking activities.’ They can’t make that claim anymore.”

McReynolds has affirmed that China’s digital military strategy has been apportioned into three separate sections. One unit is known as “specialized military network warfare forces,” which focuses on conducting network cyber attacks and defense. Second unit consists of civilian teams which have been given the authority by the Chinese military for running “network warfare operations.” Lastly, third one acts as an umbrella for “external entities” which can be organized and assembled for network warfare operations, but act outside of government departments.

According to the statement of Chinese military each unit targets US companies for the theft of valuable data affiliated to business and trade. As a consequence, it will uplift Chinese firms in the global economy.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Blind SQL Injection Tutorial to Hack a Website

In the previous article, we have the basics of SQL Injection; what SQLi is and what are the types of SQL injection. And, In...

What is SQL Injection? Tutorial: Type and Example

What is SQL injection, and what are the types of SQL injection? These are the common questions, and we will seek the answer to...

Are Cisco 300-410 Exam and Its Related Certification Your Pathway to Career Success? Find Out about This

Introduction Career success can mean different things to different people. For some, it could mean having a prestigious title and for others, it could be...

How to Hack Windows 10 Password Using FakeLogonScreen in Kali Linux

This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic and...


Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.