Everywhere the Chinese hackers had gone—high-tech companies, defense contractors—they were disturbingly successful at cracking source code repositories. With that access, they could surreptitiously change the code that made its way into commercial products and attack any customers who used the software.

