The trio split up their roles, with Yan focusing on Linux-based systems, Huang on web systems and Liu on Windows systems.
They gathered information on domain and sub-domain names associated with target organisations or websites and used open-source tools to scan for vulnerabilities on these domains.
They would next categorise the vulnerabilities found according to their severity, ease of exploitation and usefulness to Xu's objectives.
They would then set about exploiting these vulnerabilities either through direct data extraction or by deploying RATs.
On discovering vulnerabilities, the men reported them to Xu. They would also download compromised data, including information such as names, emails, phone numbers, IP addresses and site account credentials.
In one instance, a document discovered on Huang's computer contained names, addresses, phone numbers and billing information from a Philippine regional power company. They also succeeded in downloading traffic data from Yi Mei that revealed the volume of SMSes it sent out.
To obtain the objectives set out by Xu, the trio also obtained malware off the internet and interacted with other hackers, sourcing from them zero-day vulnerabilities in the network architectures of the websites they targeted.
These are previously unknown vulnerabilities in software so dubbed because they can be exploited or attacked when the vendor has had "zero days" to create a solution.
The men regularly consulted a hacker called Sun Jiao, who was also in Singapore but operated independently of Xu, conducting his own hacking and data broking operations.
The trio also enlisted an unknown developer to create custom, centralised web-based software for their operations, but they were arrested before this was completed.
The trio split up their roles, with Yan focusing on Linux-based systems, Huang on web systems and Liu on Windows systems.
They gathered information on domain and sub-domain names associated with target organisations or websites and used open-source tools to scan for vulnerabilities on these domains.
They would next categorise the vulnerabilities found according to their severity, ease of exploitation and usefulness to Xu's objectives.
They would then set about exploiting these vulnerabilities either through direct data extraction or by deploying RATs.
On discovering vulnerabilities, the men reported them to Xu. They would also download compromised data, including information such as names, emails, phone numbers, IP addresses and site account credentials.
In one instance, a document discovered on Huang's computer contained names, addresses, phone numbers and billing information from a Philippine regional power company. They also succeeded in downloading traffic data from Yi Mei that revealed the volume of SMSes it sent out.
To obtain the objectives set out by Xu, the trio also obtained malware off the internet and interacted with other hackers, sourcing from them zero-day vulnerabilities in the network architectures of the websites they targeted.
These are previously unknown vulnerabilities in software so dubbed because they can be exploited or attacked when the vendor has had "zero days" to create a solution.
The men regularly consulted a hacker called Sun Jiao, who was also in Singapore but operated independently of Xu, conducting his own hacking and data broking operations.
The trio also enlisted an unknown developer to create custom, centralised web-based software for their operations, but they were arrested before this was completed.