Mandiant Used Data Leaked by Anonymous in 2011 to Investigate Chinese Hackers

The tens of thousands of accounts leaked from turned out to be useful

In the report highlighting the activities of the Chinese cyber espionage unit responsible for breaching the systems of over 140 organizations, security firm Mandiant has also published the details of three personas believed to be involved in the APT1 campaign.

So far, we’ve covered numerous aspects of the APT1 report, but there’s another one worth noting.

In order to collect information on the three hackers, Ugly Gorilla, DOTA and SuperHard, Mandiant relied on data leaked online by Anonymous back in 2011.

At the time, the hacktivists leaked tens of thousands of usernames, email accounts, IP addresses and passwords from research website

Mandiant was fortunate enough to find an email and an IP address associated with an account registered by Ugly Gorilla. The IP address used by the hacker to register the account matched the IP range utilized in the APT1 campaign.

Data leaked by Anonymous from was also used to investigate the second hacker, DOTA. The information allowed the company to analyze his passwords, and link him to the People’s Liberation Army.

The IP address used by SuperHard to register his account also matched the IP range of the APT1 operation.

“Once again, in tracking SH we are fortunate to have access to the accounts disclosed from The account ‘SuperHard_M’ was originally registered from the IP address, w within one of the known APT1 egress ranges, and using the email address ‘’,” the report reads.

In the meantime, it’s worth mentioning that unnamed sources have revealed the US’s intentions to issue penalties, fines and trade restrictions against China in response to the numerous cyberattacks.

However, China continues to deny any involvement, once again arguing that IP addresses are not enough to pinpoint the source of an attack.

Hot right now  ·  Latest news