Generated by GPT-5-mini| PLA Unit 61398 | |
|---|---|
![]() Original uploader was Nicolau at zh.wikipedia · Public domain · source | |
| Unit name | Unit 61398 |
| Native name | 中国人民解放军第三十三集团军某部 |
| Country | People's Republic of China |
| Branch | People's Liberation Army |
| Role | Signals intelligence, cyber operations |
| Garrison | Pudong, Shanghai |
PLA Unit 61398 Unit 61398 is an alleged signals intelligence and cyber operations formation reportedly linked to the People's Liberation Army and based in Shanghai. Open-source reporting ties the unit to computer network exploitation directed at foreign corporations, government agencies, and research institutions. Investigations by private cybersecurity firms and indictments by the United States Department of Justice have brought the unit into international focus.
Reporting identifies Unit 61398 as part of a broader PLA Strategic Support Force structure tasked with signals intelligence and network operations, allegedly operating alongside formations like the PLA Unit 61486 and elements of the Second Department of the General Staff Department. Analysts have connected the unit to facilities in Pudong, proximate to Shanghai Jiao Tong University and Fudan University, and to personnel with ties to Tsinghua University and the Beijing University of Aeronautics and Astronautics. Sources including Mandiant and FireEye have detailed teams organized into sections with duties comparable to units in the United States Cyber Command and National Security Agency cyber workforce, drawing on recruits from Zhejiang University and technical institutes near Hangzhou.
Allegations claim Unit 61398 conducted computer network intrusions targeting Dow Chemical Company, Boeing, Lockheed Martin, US Navy contractors, NASDAQ firms, and Norwegian and Dutch energy companies, as reported by Mandiant, CrowdStrike, and the New York Times. Indictments by the United States Department of Justice named individuals accused of compromising networks at Westinghouse Electric Company, Alcoa, and Caterpillar Inc., while academic targets included Columbia University, Harvard University, and The Ohio State University. Accusations extend to exfiltration of intellectual property related to aviation projects and pharmaceutical research, paralleling concerns previously raised in incidents involving Equifax and Sony Pictures Entertainment.
Investigative reports attribute a series of high-profile intrusions to Unit 61398 or affiliated actors, including the compromise of Office of Personnel Management contractors’ systems and attacks on US Steel supply chains. Cybersecurity firms linked the group to persistent campaigns against Australian and Canadian organizations during the 2010s, and to spear-phishing operations resembling those used in the DNC email leak timeframe. Some operations reportedly targeted telecommunications firms such as Huawei competitors and Ericsson suppliers, and research collaborations between MIT and NASA have been cited as victims in open-source reporting.
Attribution of activities to Unit 61398 prompted formal actions by the United States, United Kingdom, Australia, and European Union partners, including diplomatic protests and public indictments by the United States Department of Justice. The UK National Cyber Security Centre and Australian Signals Directorate released advisories referencing tactics seen in campaigns attributed to PLA-linked units, while multinational responses echoed precedents set after attribution of the NotPetya and WannaCry outbreaks. Public attribution involved coordination between FBI, NSA, and private firms like Symantec and Kaspersky Lab, reflecting an evolving model of information-sharing exemplified in responses to Operation Aurora.
Legal actions, including criminal charges filed by the United States Department of Justice and civil cases pursued by affected corporations, raised questions about sovereign immunity and rules of engagement in cyberspace under frameworks such as the Tallinn Manual and discussions at United Nations forums. Diplomatic exchanges between the People's Republic of China and Western capitals invoked treaties and bilateral agreements, recalling earlier incidents addressed under the Wassenaar Arrangement and influencing negotiations at APEC and G20 meetings. The prosecutions prompted debate in legal circles referencing decisions from the International Court of Justice and standards applied in US v. Microsoft-style transnational disputes.
Responses to alleged Unit 61398 activity accelerated investment in defensive measures among affected Fortune 500 companies, leading to expanded partnerships with firms like Palo Alto Networks, CrowdStrike, and FireEye. Governments updated breach reporting regulations and bolstered capabilities in organizations such as the Cybersecurity and Infrastructure Security Agency and GCHQ, while academic programs at Stanford University, Carnegie Mellon University, and University of Oxford expanded curricula in cyber defense. The publicity around these allegations also influenced procurement policies at agencies including the Department of Defense and European Commission, encouraging adoption of zero-trust architectures and threat-hunting initiatives similar to those developed for Operation Glowing Symphony and other state-sponsored cyber campaigns.