Follow Us Subscribers SAVE 30%

Call 855-808-4530 or email to receive your discount on a new subscription.

Cybersecurity General Counsel and In House Counsel Technology Media and Telecom

Online Extra
Chinese Nationals Charged With Hacking Firms to Steal M&A Info

Three Chinese nationals face federal charges for allegedly hacking into two major U.S. law firms in a scheme to trade on information about imminent mergers and acquisitions.


Thank you for sharing!

Your article was successfully shared with the contacts you provided.

Three Chinese nationals face federal charges for allegedly hacking into two major U.S. law firms in a scheme to trade on information about imminent mergers and acquisitions.

U.S. Attorney Preet Bharara of the Southern District of New York announced on Dec. 27 that Iat Hong, Bo Zheng and Hung Chin have been charged with infiltrating the servers of two law firms in 2014 and 2015 and accessing nonpublic information about pending deals. According to Bharara’s office, the information was used in trades that reaped roughly $4 million in illegal profits.

The indictment  does not name the law firms, which are referred to as Law Firm 1 and Law Firm 2. According to the charges, Law Firm 1 advised Intel Corp. on its 2015 acquisition of Altera Corp. for $16.7 billion and represented a company that was in deal talks with InterMune Inc., which sold to Roche AG in 2014 for $8.9 billion.

The second major law firm advised Pitney Bowes Inc. in the 2015 acquisition of New York-based e-commerce company Borderfree, the indictment states.

Based on those details, the two firms appear to be Weil, Gotshal & Manges and Cravath, Swaine & Moore, firms where cyberbreaches previously were reported. Weil represented Intel in the Altera buy and Cravath is identified in securities filings as Pitney Bowes lead deal counsel.

Representatives of both firms, reached on Dec. 27, declined to comment.

“This case of cyber meets securities fraud should serve as a wake-up call for law firms around the world: you are and will be targets of cyber hacking, because you have information valuable to would-be criminals,” Bharara said.

In addition to infiltrating the two firms, Bharara said the defendants went after at least five other law firms between March and September 2015, trying to get unauthorized access to the firms’ networks and servers on over 100,000 occasions.

On the successful hacks, once the defendants obtained access to the law firm networks, Bharara said, they focused on email exchanges between law firm partners and associates as momentum built toward the culmination of the deals.

Hong, 26, was arrested on the charges on Dec. 25 in Hong Kong and is now facing extradition to the United States. He was charged in a 13-count indictment along with co-defendants Hung, 50, also of Macau, and Zheng, 30, of Changsha, China. Both Hung and Zheng remain at large.

The defendants also went after inside information on at least 10 additional contemplated M&A transactions, some of which never came to pass.

Last January, Bharara said in a speech at New York University that one area “we’ll be talking about in the future” is the “vulnerability on the part of law firms and consultants.”

In March, reports emerged that his office was probing a series of breaches at Cravath, Swaine & Moore; Weil, Gotshal & Manges and other firms by individuals believed to be pursuing insider information on pending mergers and acquisitions.

Cravath at the time confirmed only that there had been a “limited breach” of its IT systems in the summer of 2015. A firm representative did not immediately respond to a phone call and email about the new criminal charges.

The Securities and Exchange Commission filed a parallel civil enforcement action on Dec. 27 that seeks an asset freeze to prevent the three from cashing out on other stocks they may have purchased as part of the scheme.

According to federal authorities, Hong emailed Hung on July 29, 2014 with the names of 11 partners in the New York, Washington DC, Silicon Valley and Hong Kong offices of Law Firm 1.

Two days later, according to the SEC, the hackers used malware to obtain “broad access” to the firm’s network, breached the user account of a firm IT employee, and used that access to infiltrate all email accounts — all the while using deceptions to make it appear to be normal network activity.

In all, the defendants allegedly pilfered more than 59 gigabytes of data, or the equivalent of nearly 6 million printed pages.

The second firm was hacked on April 6, 2015, again with the use of malware on the firm web server, the indictment alleges. Between April 28 and July 31, the defendants stole seven gigabytes of compressed data, according to the charges.


The views expressed in the article are those of the authors and not necessarily the views of their clients or other attorneys in their firm.

Read These Next