PLA-Linked Cyber Operations: Units, Funding Mechanisms, and Personnel Attribution
1. EXECUTIVE SUMMARY
This report synthesizes publicly available information regarding cyber units affiliated with the People’s Liberation Army (PLA) of China. It addresses three core queries: (1) organizational units conducting cyber operations, (2) funding mechanisms supporting these activities, and (3) identities of individuals linked to these units.
Key Findings:
- The PLA maintains dedicated cyber warfare units, historically organized under the Strategic Support Force and, as of April 2024, consolidated under the newly established PLA Cyberspace Force.
- At least four PLA unit designations (61398, 61486, 78020, 61786) have been credibly linked to advanced persistent threat (APT) campaigns through technical attribution and legal indictments.
- Publicly confirmed individual identities are limited to five persons indicted by the U.S. Department of Justice in 2014 for activities tied to Unit 61398, plus four additional individuals charged in 2020 for the Equifax breach.
- Specific budget allocations, financial transaction records, and comprehensive personnel rosters are not available in the public domain due to classification and state secrecy protocols.
- China employs a “whole-of-nation” cyber strategy that blends military units, intelligence services, state-owned enterprises, and contracted civilian actors, complicating precise attribution.
2. SCOPE AND LIMITATIONS :
2.1 Scope
This analysis covers:
- PLA organizational structures with cyber warfare responsibilities
- Unit designations publicly linked to cyber espionage or offensive operations
- Individuals formally charged by foreign judicial bodies with ties to PLA cyber units
- Documented or inferred funding pathways for PLA cyber capabilities
2.2 Limitations
- Classification Barrier: Detailed budgets, internal memoranda, and personnel files are state secrets under Chinese law.
- Attribution Uncertainty: Technical indicators can suggest PLA involvement but rarely prove command-and-control relationships with public certainty.
- Terminology Variance: Cybersecurity firms use different naming conventions (e.g., APT1 vs. Comment Crew vs. Unit 61398), creating potential confusion.
- Dynamic Reorganization: The April 2024 dissolution of the Strategic Support Force and creation of the Cyberspace Force means some historical unit designations may no longer reflect current command structures.
3. PLA CYBER ORGANIZATIONAL STRUCTURE
3.1 Historical Framework (Pre-2024)
Prior to April 2024, PLA cyber operations were primarily managed under the Strategic Support Force (PLASSF), established in 2015 to consolidate space, cyber, and electronic warfare capabilities. Key subordinate elements included:
- Third Department (Technical Reconnaissance): Responsible for signals intelligence and cyber espionage; housed many APT-linked units.
- Fourth Department (Electronic Countermeasures): Focused on offensive cyber operations and electronic warfare.
- Network Systems Department: Managed defensive cyber operations and infrastructure protection.
3.2 Current Framework (Post-April 2024)
In April 2024, China reorganized its military cyber structure:
- The Strategic Support Force was dissolved.
- A new, independent People’s Liberation Army Cyberspace Force was established as a separate service branch.
- This reorganization signals elevated prioritization of cyber capabilities and likely streamlines command, control, and resource allocation for cyber operations.
Implication: Historical unit designations (e.g., “Unit 61398”) may persist operationally but now fall under a new institutional umbrella. Public reporting has not yet fully mapped legacy units to the new structure.
4. IDENTIFIED PLA-LINKED CYBER UNITS
The following unit designations have been credibly associated with cyber operations through technical attribution, victim testimony, or legal proceedings:
| Unit Designation | Common APT Alias | Primary Target Sectors | Notable Campaigns or Characteristics |
|---|---|---|---|
| PLA Unit 61398 | APT1, Comment Crew | Technology, manufacturing, defense contractors | Sustained IP theft campaigns (2006–2013); subject of landmark Mandiant report and 2014 U.S. indictments |
| PLA Unit 61486 | APT2, Putter Panda | Aerospace, satellite communications, aviation | Long-term espionage against U.S. and allied defense aerospace firms |
| PLA Unit 78020 | APT30, Naikon | Southeast Asian governments, NGOs, dissident groups | Regionally focused espionage with sophisticated phishing and malware deployment |
| PLA Unit 61786 | (No widely adopted APT alias) | Telecommunications infrastructure | Limited public attribution; referenced in specialized threat intelligence reports |
4.1 Broader APT Ecosystem with Potential PLA Links
Numerous advanced persistent threat groups exhibit tactics, infrastructure, or targeting patterns consistent with Chinese state sponsorship. While direct PLA affiliation is not always publicly confirmed, these groups operate within China’s broader cyber ecosystem:
- APT3 (Buckeye)
- APT10 (Red Apollo, Stone Panda)
- APT12 (Numbered Panda)
- APT15 (Ke3chang)
- APT17 (DeputyDog)
- APT18 (Dynamite Panda)
- APT19 (Codoso Team)
- APT20 (Wocao)
- APT27 (Emissary Panda)
- APT31 (Zirconium, Judgment Panda)
- APT40 (Leviathan)
- APT41 (Double Dragon, Winnti Group)
- Hafnium
- Volt Typhoon
- Flax Typhoon
- Salt Typhoon
- Mustang Panda
- Tropic Trooper
- Spamouflage (Dragonbridge)
Analytical Note: Many of these groups likely involve collaboration between PLA units, Ministry of State Security (MSS) intelligence officers, and contracted civilian hackers under China’s Military-Civil Fusion strategy.
5. PUBLICLY IDENTIFIED INDIVIDUALS
Only a small number of individuals have been formally charged by foreign judicial authorities with direct ties to PLA cyber units. These cases represent the most concrete public linkage between named persons and state-sponsored cyber operations.
5.1 2014 U.S. Indictment: Unit 61398 Personnel
In May 2014, the U.S. Department of Justice unsealed indictments against five members of PLA Unit 61398:
| Name (Romanized) | Chinese Characters | Alleged Role | Charges |
|---|---|---|---|
| Wang Dong | 王东 | Team leader / operator | Computer fraud, economic espionage, wire fraud, identity theft |
| Sun Kailiang | 孙凯良 | Technical operator | Same as above |
| Wen Xinyu | 温新宇 | Technical operator | Same as above |
| Huang Zhenyu | 黄振宇 | Infrastructure support | Same as above |
| Gu Chunhui | 顾春辉 | Domain registration / operational support | Same as above |
Status: All five individuals remain at large in China. The Chinese government rejected the indictments as politically motivated and refused to cooperate with U.S. legal requests.
5.2 2020 U.S. Indictment: Equifax Breach Conspirators
In February 2020, the U.S. Department of Justice charged four individuals with conspiracy in the 2017 Equifax data breach, alleging PLA affiliation:
| Name (Romanized) | Alleged Affiliation | Role in Conspiracy |
|---|---|---|
| Wu Zhiyong | PLA-linked (unit unspecified) | Technical lead / malware development |
| Wang Xiaoming | PLA-linked | Infrastructure management |
| Liu Jiang | PLA-linked | Operational coordination |
| Wang Dong | PLA-linked (distinct from 2014 indictee) | Data exfiltration support |
Note: Specific unit designations were not publicly disclosed in this indictment, though U.S. officials characterized the operation as state-sponsored.
5.3 Attribution Caveats
- These individuals represent a tiny fraction of the personnel likely involved in PLA cyber operations.
- Most operators use pseudonyms, operational aliases, or work behind layers of institutional anonymity.
- Public identification typically occurs only after extensive forensic investigation and intergovernmental intelligence sharing.
6. FUNDING MECHANISMS: STRUCTURES AND INFERRALS
While precise budget figures for PLA cyber units are not publicly disclosed, analysts have identified several structural and indirect funding pathways:
6.1 Central Military Commission (CMC) Budget Allocation
- Cyber units receive funding through the PLA’s overall defense budget.
- China’s official defense budget is approximately $230 billion USD annually, but independent estimates—including undisclosed research, development, and special programs—suggest total military spending may exceed $450 billion USD.
- Cyber capabilities are considered a priority investment area under China’s defense modernization goals.
6.2 Military-Civil Fusion (MCF) Strategy
- China’s national strategy explicitly integrates civilian technological innovation with military applications.
- PLA cyber units benefit from:
- Partnerships with universities and research institutes
- Access to commercial cybersecurity firms and talent
- Technology transfer from private-sector R&D
- This model allows cyber capabilities to be developed and funded through ostensibly civilian channels, obscuring direct military expenditure.
6.3 State-Owned Enterprise (SOE) and Defense Industry Support
- Equipment, infrastructure, and technical services for cyber units are procured through China’s state defense industrial base (e.g., China Electronics Technology Group Corporation, China Aerospace Science and Industry Corporation).
- Costs are embedded within broader defense procurement contracts, making cyber-specific spending difficult to isolate.
6.4 Indirect Economic Benefits
- Some analysts argue that intellectual property stolen via cyber espionage provides indirect “funding” by accelerating domestic technological development and reducing R&D costs for Chinese firms.
- While not a formal budget line, this economic benefit reinforces state support for cyber operations.
6.5 Operational Funding Characteristics
- Funding is likely allocated on a multi-year planning cycle aligned with China’s Five-Year Plans.
- Resources may be distributed through classified annexes to the national budget, inaccessible to public scrutiny.
- International sanctions or export controls may necessitate alternative procurement channels, potentially increasing operational costs.
7. ATTRIBUTION CHALLENGES AND ANALYTICAL UNCERTAINTIES
7.1 Technical Attribution Limitations
- Malware code, infrastructure reuse, and operational patterns can suggest common authorship but rarely prove state sponsorship with legal certainty.
- Adversaries may engage in “false flag” operations or reuse tools to mislead attribution efforts.
7.2 Institutional Overlap
- China’s cyber ecosystem involves multiple actors:
- PLA military units
- Ministry of State Security (MSS) intelligence services
- Ministry of Public Security (MPS) domestic security apparatus
- Contracted civilian hackers and “patriotic” hacker collectives
- Operations may involve collaboration across these entities, blurring lines of responsibility.
7.3 Political and Diplomatic Constraints
- China consistently denies state-sponsored hacking, characterizing accusations as “groundless” and politically motivated.
- Diplomatic tensions can influence the timing and framing of public attribution announcements by foreign governments.
7.4 Evolving Operational Security
- PLA cyber units have demonstrated increasing sophistication in operational security, including:
- Use of compromised third-party infrastructure
- Custom malware with limited code reuse
- Strict compartmentalization of personnel and tasks
- These practices reduce the likelihood of future public identifications of units or individuals.
8. STRATEGIC IMPLICATIONS
8.1 For Defensive Cyber Postures
- Organizations in technology, defense, aerospace, and critical infrastructure sectors should assume persistent targeting by PLA-linked actors.
- Defense strategies must account for both espionage and potential pre-positioning for disruptive operations.
8.2 For Policy and Deterrence
- The lack of transparent budgeting and personnel accountability complicates traditional deterrence models.
- Effective responses may require enhanced international coordination, targeted sanctions, and resilience-focused investments rather than solely attribution-based retaliation.
8.3 For Research and Analysis
- Open-source analysts must rely on technical indicators, victim reporting, and occasional legal disclosures.
- Continuous monitoring of Chinese defense white papers, procurement notices, and academic publications may yield indirect insights into cyber capability development.
9. CONCLUSION
Publicly available information permits a partial mapping of PLA-linked cyber units, a very limited identification of associated individuals, and an inferred understanding of funding structures. However, the inherently classified nature of military cyber operations, combined with China’s strategic use of ambiguity and institutional complexity, ensures that a truly “complete” list of units, funding details, and personnel names remains inaccessible to open-source research.
Key takeaways:
- Units: At least four PLA unit designations have been credibly linked to cyber operations; many additional APT groups operate within China’s broader state-sponsored ecosystem.
- Individuals: Only nine individuals have been publicly charged with PLA-linked cyber activities, all by U.S. authorities; all remain at large.
- Funding: Specific budget allocations are undisclosed; funding flows through the PLA’s overall budget, Military-Civil Fusion programs, and state industrial procurement.
- Attribution: Precise attribution remains challenging due to technical, institutional, and political factors.
Future developments—such as additional indictments, defections, leaked documents, or changes in China’s transparency policies—could alter this assessment. Until then, analysts must work within the constraints of partial visibility and high uncertainty.
SALT TYPHOON: COMPREHENSIVE RESEARCH & ANALYSIS REPORT
PLA-Linked Cyber Operations

