Since the onset of the Ukraine war, cyber analysts have noted a significant rise in hacking efforts by groups affiliated with the Chinese government aimed at Russian military and governmental institutions. These breaches began to spike in May 2022, shortly after Russia launched its full-scale invasion of Ukraine, yet they have gone largely unreported by Russian officials despite official claims of partnership between the countries. A notable group, Sanyo, has reportedly posed as a prominent Russian engineering firm in attempts to gather intelligence on nuclear submarines, according to findings from TeamT5, a cybersecurity research firm based in Taiwan.

The real reason behind China’s hacking campaign appears to be the collection of military secrets and insights into modern warfare tactics, defense technologies, and responses to Western military hardware. Chinese military strategists acknowledge a gap in battlefield experience compared to their Russian counterparts, prompting a desire to glean insights from Russia's ongoing conflict in Ukraine. Che Chang, a researcher at TeamT5, notes that China aims to understand Russia's operational strategies and technological developments during its military maneuvers.

Despite the covert nature of these intrusions and the lack of public acknowledgment from Russian entities regarding the security breaches, concerns have emerged within Russian intelligence circles. A classified document from the F.S.B., Russia’s domestic security agency, reveals acknowledgment of China’s aggressive pursuit of Russian military expertise, labeling the nation as an adversary rather than an ally. This relationship, marked by espionage despite claims of cooperation, adds a complicated layer to the ongoing geopolitical tensions surrounding the Russia-Ukraine conflict.