The hidden network: How China unites state, corporate, and academic assets for cyber offensive campaigns

research.cert.orangecyberdefense.com · Marine PICHON and Piotr Malachiński · 1 year ago · research
quality 7/10 · good
0 net
Orange Cyberdefense CERT Threat Research: The hidden network report The hidden network Explore our interactive map How China unites state, corporate, and academic assets for cyber offensive campaigns TL;DR Since February 2024, the World Watch Cyber Threat Intelligence team has been working on an extensive study of the private and public relationships within the Chinese cyber offensive ecosystem. This includes: An online map showcasing the links between 300+ entities; Historical context on the Chinese state entities dedicated to cyber offensive operations; An analysis of the role of universities and private companies in terms of capacity building; A focus on the ecosystem facilitating the acquisition of vulnerabilities for government use in cyber espionage campaigns. Note: The analysis cut-off date for this report was October 22, 2024. Authors: Piotr Malachiński & World Watch team Table of Contents Introduction State institutions and capacity building process Private companies as hack-for-hire contractors Universities as hubs for offensive security research A telling case of the vulnerability gathering system Using our interactive map Sources Introduction Between 2023 and 2024, our World Watch Cyber Threat Intelligence team issued over 35 advisories and updates concerning zero-day vulnerabilities exploited by Chinese threat actors. These account for 41% of all advisories with a high or very high threat level (equal to or above 4/5 based on our scoring scheme), representing a substantial portion of the critical threats potentially facing our customers. Whether aimed at directly compromising organizations for intelligence gathering or broadly infecting edge devices to build botnets or operational relay box (ORB) networks, the exploitation of vulnerabilities by Chinese state-linked threat actors underscores their considerable offensive capabilities. The existence of state-sponsored threat groups operating under the Chinese state's direction has long been well documented. Since Mandiant's groundbreaking 2013 report exposing APT1, numerous other Advanced Persistent Threat (APT) groups have been linked to Chinese government entities, particularly the People's Liberation Army (PLA) and the Ministry of State Security (MSS). Given China's authoritarian governance, characterized by extensive party control over social, political, and economic spheres, one might assume that cyber operations by these APT groups remain strictly in the hands of the state. However, China's offensive cyber capabilities are, in fact, supported by a complex and multi-layered ecosystem involving a broad array of state and non-state actors. In February 2024, a leak at a Chinese company Sichuan i-SOON provided further evidence of the extensive public-private cooperation in support of Chinese state cyber operations. From official contracts to internal communications, the leaked documents exposed i-SOON's role as a long-time contractor for the MSS , carrying out cyber campaigns against targets in over 70 countries, from France to Rwanda or Nepal. China's engagement with non-state actors is not confined to private companies. The government has a longstanding tradition of integrating top universities into national security efforts . The "Seven Sons of National Defense", for instance, are key academic institutions affiliated with the Ministry of Industry and Information Technology, contributing significantly to the state's defense R&D efforts. As it turns out, this collaboration also extends to cyberspace, as the academia increasingly supports state-sponsored cyber campaigns , often focused on espionage to advance China's political and economic interests. This report offers a comprehensive overview of China's cyber threat landscape , with a particular focus on the integration of civilian and military cyber capabilities. It contextualizes these actors' activities and builds on existing research by leading experts and insiders, including Dakota Cary, Adam Kozy, Eugenio Benincasa, the Natto Thoughts research team, and the Intrusion Truth group. The report also introduces a detailed, interactive map created by the authors, which visualizes the connections between hundreds of public and private entities, spanning government, industry, and academia. This research focuses on the participation of state and non-state actors in the structured cyber activities emblematic of APT groups. As such, discussions on financially motivated cybercriminals, including extortion and ransomware groups, as well as hacktivists, will be limited to their connections with state-sponsored entities. Additionally, while disinformation and malign influence operations are related to Chinese cyber-enabled activities, they fall outside the scope of this analysis and will not be covered here. The report is structured as follows: Section 1 provides an overview of the key state actors involved in China's cyber threat ecosystem, including the Ministry of State Security (MSS) and the People's Liberation Army (PLA) , with an emphasis on their historical development. Section 2 explores the complex roles and impact of private companies on state-sponsored cyber operations, as well as the internal dynamics of cooperation and competition within the sector. Section 3 examines the role of academic institutions in APT campaigns, highlighting their function as the state's hub for offensive security research and development, as well as a crucial source of new talent for state-sponsored cyber efforts. Section 4 presents a case study on China's software vulnerability gathering system , showcasing the cooperation between public, corporate, and academic actors. Section 5 introduces the authors' comprehensive database, presented as an interactive map that visualizes the intricate network of relationships between public and private entities involved in China's cyber operations. State institutions and capacity building process Understanding the cyber threats posed by China requires a closer examination of the state apparatus and how it progressively built its intelligence collection and cyber warfare capabilities from an institutional perspective. This process of shaping proper structures for planning and orchestrating cyberattacks took place over the last three decades, with the main stakeholders being: The People's Liberation Army (PLA), The Ministry of State Security (MSS), The Ministry of Public Security (MPS), The Ministry of Industry and Information Technology (MIIT). a. The People's Liberation Army (PLA) Subordinated to the Central Military Commission (the military command authority of the Communist Party's Central Committee), the PLA notably consolidated its SIGINT capabilities applied to cyberspace in the 2010s. While new cyberspace-related organizations emerged within the PLA in the mid-2000s, the 2015-2016 military reform fundamentally reshaped the PLA, most notably with the introduction of the Strategic Support Force (SSF) . Clearly designed to bring advantages in cyber warfare, the SSF took over and merged into its Network Systems Department (NSD) many of the cyber espionage responsibilities and operational units from the former Third and Fourth Departments of the PLA. Some of these units, visible in our cartography, are infamous for being linked to specific APT clusters, following indictments and CTI reports on their malicious campaigns throughout the 2010s. On April 19, 2024, the Network Systems Department was reorganized as the independent PLA Information Support Force , along with the creation of PLA Cyberspace Force . As explained by Joe McReynolds and John Costello from the China Cyber and Intelligence Studies Institute, it's unclear how both entities' missions will be divided, with some clear overlaps expected, especially in intelligence gathering and electronic warfare. b. The Ministry of State Security (MSS) and Ministry of Public Security (MPS) Beyond the PLA, Chinese offensive cyber capabilities have been introduced over the last 30 years by civil government departments responsible for intelligence and security, namely the Ministry of State Security (MSS) and the Ministry of Public Security (MPS) . More importantly, the MSS and its decentralized regional offices serve as both an internal security service and foreign intelligence collection agency. Established in 1983, the MSS particularly focuses on state stability issues (embodied by the "Three Evils" of separatism, terrorism, and extremism). As noted by Alex Joske, the MSS' provincial organs are extremely important as they tend to have far more personnel than the central Ministry, and some degree of geographical specialization based on the international connections of their region. Following successive public reporting on PLA-attributed cyber operations in the early 2010s, the MSS began playing an increasingly prominent role in conducting cyberespionage operations , including against foreign targets. According to Adam Kozy, this shift was also due to the rise of the increasingly efficient contractor model, with the MSS using a mix of in-house talents and cyber contractors to carry out more covert and advanced cyber espionage activities. Meanwhile, the Ministry of Public Security is responsible for public law enforcement and political security since 1983. The MPS focuses on domestic affairs and operates in the cyber field because of its historic counterintelligence and computer crime investigations mandates. One could also mention here the Ministry of Industry and Information Technology (MIIT), which regulates industrial IT policy and manages China's telecommunications, IT and network infrastructure affairs. In a way, the MIIT is also charged with developing the infrastructure, human capital, and technology necessary for the MSS and MPS, for instance through its State Administration of Science, Technology and Industry for National Defense (SASTIND) agency. Figure 1: Partial organigram of the Chinese state entities directly or indirectly involved in offensive cyber operations. c. State capacity building and cooptation Finally, as argued by Tim Maurer, author of 'Cyber Mercenaries: The State, Hackers, and Power' , an essential dynamic that accompanied the restructuring of these state institutions was China's gradual progressive coopting of civilian hackers through institutionalized incentives . Indeed, the 1990s in China featured the rise of Internet and the emergence of first Chinese hacking groups, such as the Green Army founded in 1997, which gathered some 3,000 members. Initially condemned by the Chinese state, these hacktivist clusters were gradually tolerated and eventually encouraged and even protected by the state due to their patriotic alignment. From 2003 onwards, this growing hacking workforce was systematically incorporated into the PLA, MSS, and MPS via competitions, job postings on hacker forums, and more direct freelance-like participation in offensive operations. While these Chinese hackers mainly carried out web defacements and DDoS attacks until around 2006, these activities matured into more sophisticated data thefts operations under Hu Jintao and Xi Jinping's presidencies. Overall, between the 1980s and the 2010s, the enhancement of Chinese cyberespionage capabilities relied on both the restructuring of historical state institutions as well as the progressive recruitment of patriotic hackers. This laid the foundation for what would become a " fully institutionalized militia ", working hand-in-hand with the private sector and academia. Private companies as hack-for-hire contractors China boasts the world's second largest cybersecurity industry, valued at over $22 billion. While the hundreds of private cybersecurity providers reinforce China's status as a global security leader, several of them support the state more directly. The contracting spectrum can be very large, with private organizations engaging in cyberattacks against domestic and foreign entities of strategic interest for the PRC and others providing services that may facilitate them, ranging from infrastructure leasing, tool development, to hacking-for-hire... The recent takedown of the Raptor Train botnet used by Chinese APTs for cyberespionage highlighted the involvement of the publicly-traded Chinese company Integrity Technology Group (ITG). The latter was clearly associated to a front-end application used to manage the bots. This collaboration is now standard practice, especially within the MSS, which leverages an extensive network of private sector connections. a. Corporate contractors of varied size Just like Integrity Technology Group, which was listed on the Shanghai stock exchange, China's top cyber contractors are often the country's industry leaders . Enterprises such as ThreatBook , Qihoo360 , and Qi An Xin not only provide defensive security solutions to public agencies but are also believed to indirectly contribute to offensive cyber operations. Unlike those large firms, i-SOON belongs to a more numerous group of small to medium-sized entities . Despite their limited size, many Chinese SMEs tend to specialize in multiple cyber subdomains at once. For instance, i-SOON, reportedly employing only 72 workers before the leak, would offer services ranging from penetration testing and malware development to intelligence analysis and red team training. These entities often act as subcontractors to the industry giants , filling the gap in their cyber offensive competencies and further fragmenting the hack-for-hire supply chain . The choice of subcontractors typically rests with the prime contractor, potentially influenced by personal relationships between the company executives , reflecting the Chinese cultural practice of guanxi (å ³ç³»). These smaller companies also take on contracts directly from the state, particularly from regional and municipal government agencies . These contractors operate in a fiercely competitive environment , constantly fighting for state contracts. Yet, despite this rivalry, collaboration is not uncommon : i-SOON, for example, procured a vulnerability affecting the QQ messaging platform for an intrusion campaign from NoSugarTech , its competitor co-founded by Qihoo360 . These complex dynamics of competition and cooperation can occasionally lead to legal conflicts, as seen when APT41-linked Chengdu 404 sued i-SOON over intellectual property rights violations. b. Opportunities and risks of contracting The inclusion of private enterprises in the PRC's hacking operations provides the Chinese state with several strategic advantages. One key benefit is plausible deniability ; when an attack is traced back to a private company, it may be more challenging for Western authorities to establish a direct link to the Chinese government. Even after companies like Chengdu 404 are sanctioned by foreign governments, they often continue their operations within China and may even receive financial support from the state, allowing them to maintain business as usual. Significantly, private contractors offer the state access to a pool of hacking talent within the private sector, bringing cyber offensive expertise that may not be readily available within governmental agencies. However, this intricate web of public-private relationships also introduces significant risks . While government and military units typically adhere to strict security standards, ensuring the same level of compliance among private contractors and their subcontractors is more challenging. Although obtaining secrecy certifications and government-approved certified supplier status is needed for state contracts and cyber weapons production, effective auditing and supervision of providers gets harder with further fragmentation of the supply chain. This can lead to inconsistencies in cyber hygiene and Operational Security measures, increasing the likelihood of errors that could expose sensitive cyber operations or their sponsors. c. "Front" companies It is important to note, however, that not all corporate entities linked to Chinese state-sponsored cyberattacks can be considered contractors in real terms . In many instances, individuals linked to the MSS or PLA units register fake companies to obscure the attribution of their campaigns to the Chinese state. These fake enterprises, which engage in no real profit-driven activities, may help procure digital infrastructure needed for conducting the cyberattacks without drawing unwanted attention. They also serve as fronts for recruiting personnel for roles that support hacking operations. Distinguishing between genuine contractors and front companies can prove challenging, particularly when dealing with smaller enterprises that have limited online presence or business transparency. While some subcontractors might openly advertise their grey-market services, this is not always the case. A lack of open-source information about a company doesn't automatically indicate it's a front for state-backed hacking. However, there are often telltale signs suggesting certain entities are not legitimate registered companies. For instance, 13 front enterprises linked to APT40 shared similar names and were registered by the same individuals or to the same addresses. Figure 2: Extract of our map visualizing some of the front companies tied to MSS Hainan Bureau and all associated with the APT40 cluster by Intrusion Truth. Universities as hubs for offensive security research Recognizing the critical nature of cybersecurity, the Chinese government has increasingly emphasized the role of educational institutions in advancing the country's cyber capabilities. This was clearly highlighted in 2017, when China began certifying select universities as World-Class Cybersecurity Schools, and further solidified in the 14th Five-Year Plan for the years 2021-2025. This emphasis reveals a dual implication. Naturally, the proliferation of cybersecurity programs at universities has allowed China to form new security cadres and bolster the nation's cyber defense posture. More significantly, however, universities have also emerged as hubs for offensive security research that can be leveraged by state authorities. Additionally, some academic institutions have evolved into incubators for cyber threat groups , channeling young talents into APT-related public and private entities. a. Participation in cyber offensive efforts Like many other nations, China maintains several military universities that work closely with the armed forces. It comes as no surprise, for instance, that the PLA Information Engineering University has been involved in a project aiming at testing malware effectiveness for the military, while the National University of Defense Technology hosts a lab focused on electromagnetic interference against information systems. Additionally, other universities play a crucial role in the development of cyber ranges , often in collaboration with private enterprises and the military. Cyber ranges are virtual environments consisting of interconnected virtual machines that simulate real-world computer networks, allowing users to practice security operations and hone their skills in a controlled setting. For example, Shanghai Jiao Tong University , in collaboration with cyber range complex Peng Cheng Lab , has conducted advanced research on the use of AI in cybersecurity using a supercomputer. The school is among the most advanced in research at the intersection of AI and cyberspace , alongside Hainan University and Southeast University. More striking, however, is the extent of collaboration between military structures and civilian universities for offensive operations directly . Several schools, such as Southeast University or Xidian University , have received research grants from the PLA for information security R&D and have directly contributed to the army's operational capabilities . In some cases, universities' infrastructure may be leveraged by state-linked threat actors. For example, Unit 61726 of the Third Department of the PLA, known as Circuit Panda , allegedly used Wuhan University's facilities for cyber operations targeting Taiwanese entities. Among the C9 League universities – the nine most prestigious Chinese universities enjoying robust state funding – only Fudan University has yet to be linked to any state-sponsored offensive security operations. Figure 3: C9 League Universities in China (Fudan University, Shanghai Jiao Tong University, Harbin Institute of Technology, Nanjing University, Peking University, Tsinghua University, University of Science and Technology of China, Xi'an Jiaotong University, and Zhejiang University) b. Talent pipeline for the state and contractors One of the most critical roles of higher education institutions in China's offensive cybersecurity ecosystem is to supply young talent to the PLA and Ministry of State Security units, as well as to private contractors. For instance, Unit 61398 of the Third Department of the PLA, associated with APT1 , aggressively recruited from universities like Zhejiang University and Habrin Institute of Technology , offering attractive career opportunities in cybersecurity, intelligence and specialized training programs. For the same reasons, leading civilian institutions like Tsinghua University have collaboration programs with military academies, aligning their cyber training curricula with the state's operational needs. Beyond direct hacking roles, recent university graduates are reportedly being recruited for complementary tasks that contribute to cyber operations indirectly. These includes translation of stolen documents or gathering open-source intelligence on potential victims, particularly to facilitate spear phishing attacks. In one such case, the front company Hainan Xiandun operated by APT40 recruited recent English language graduates for espionage-related work, without the recruits knowing the true nature of the company's activities. Hacking competitions serve as yet another recruitment pipeline for private contractors and state entities , as evidenced by the recently published deep-dive report and tracker by Dakota Cary (Nonresident Fellow at the Atlantic Council's Global China Hub) and Eugenio Benincasa (Senior Researcher at ETH Zurich Center for Security Studies). Renowned teams from top universities, such as Blue Lotus from Tsinghua University or 0ops from Shanghai Jiao Tong University, frequently compete in or organize these events, demonstrating their red team skills to potential employers. Some team members would later establish their own cybersecurity companies. Meanwhile, these competitions also benefit the state and its operational needs more directly, both for talent spotting or to repurpose vulnerabilities and techniques discovered by the student groups in state-sponsored cyber campaigns (more on that in Section 4) . For instance, Cary and Benincasa described how the Wangding Cup or the CTFWar practice platform and competition is likely used by the MSS and MPS as a talent-recruitment pool. A telling case of the vulnerability gathering system No other example illustrates the integration of private security companies and universities into China's state cybersecurity framework better than the vulnerability disclosure ecosystem. a. Network of vulnerability databases This versatile and exceptionally well-organized system, analyzed in depth by researchers Dakota Cary and Kristin Del Rosso, relies on several interconnected vulnerability databases. The China National Vulnerability Database (CNVD) is managed by CNCERT/CC , China's central incident response team. Its collected vulnerabilities are channeled to its technology collaboration organizations, including some known offensive contractors for the PLA and MSS . It is quite telling that among the three main partner sub-databases from which CNVD gathers vulnerabilities, one is operated by the industry giant Qi An Xin , while another - by Shanghai Jiao Tong University . Another significant database, CNNVD , or China National Vulnerability Database of Information Security , is particularly susceptible to be used in offensive campaigns. CNNVD is managed by CNITSEC , a cover identity of the 13 th Bureau of the MSS . It receives vulnerabilities from at least 150 private sector partners , categorized into three tiers based on their capacities and frequency of bug submissions. According to Recorded Future, the MSS likely withholds selected high-value flaws for its own needs, with anecdotal evidence suggesting suspicious patterns in CNNVD's reporting time . For example, analyst Adam Kozy noted that the threat group KRYPTONITE PANDA exploited a critical Microsoft Office vulnerability (CVE-2018-0802) a month before its disclosure to the vendor by Qihoo 360, which initially discovered the flaw. The vulnerability management ecosystem underwent significant changes in 2021 , with the introduction of the “ Regulations on the Management of Network Product Security Vulnerabilities ”, or RMSV . This regulation prohibits researchers from disclosing vulnerabilities publicly or to the affected vendor without first consulting the Ministry of Industry and Information Technology (MIIT) . Under this framework, vulnerabilities are now funneled to the MIIT-managed Vulnerability Information Sharing Platform (NVDB) via several sub-databases, such as the ICS VulnerabilityDatabase and the Mobile Applications Vulnerability Database. This development increases the risk of zero-day exploitation in China's state-sponsored hacking campaigns . Despite this, Chinese researchers continue to regularly submit flaws in foreign products to vendors like Microsoft and Apple. b. Impact of hacking competitions An overview of this ecosystem would not be complete without taking a closer look at hacking competitions . As evidenced by Eugenio Benincasa, these events serve not only as cyber talent incubators but also as direct sources of cutting-edge vulnerabilities provided by competing teams. Chinese universities like Tsinghua and Shanghai Jiao Tong have become leaders in this field, hosting renowned teams such as Blue Lotus and 0ops . Initially competing in international hacking contests like DEFCON and Pwn2Own, these teams have over time contribute to the growing number of domestic competitions in China, such as the brand-new Matrix Cup . Graduates of these teams have often gone on to establish their own cybersecurity enterprises , many of which are now leading contributors to state vulnerability databases. Some companies, such as Tencent , have formed their own dedicated CTF teams , while others, including i-SOON , have been heavily sponsoring existing CTF events or even establishing their own (e.g. Anxun Cup). Moreover, these competitions are often the result of strong partnerships between industry leaders and academic institutions. A notable example is the TOPSEC Cup , which was co-organized by Beijing Topsec , a known PLA contractor, in partnership with Southeast University . In one instance, its participants were tasked with infiltrating the networks of VAE Inc., a U.S. Department of Defense contractor. Targets of these exercises are often strategically selected to align with the state's cyber interests , focusing on entities that later become priorities of APT hacking campaigns. Consequently, the vulnerabilities and exploits discovered during the events have, on several occasions, been repurposed for state-sponsored cyber campaigns. For instance, the "Chaos" exploit, developed by Zhao Qixun during the 2021 Tianfu Cup, was reportedly shared with Chinese state agencies, and later used in targeted attacks against Uyghurs before any patches were released. Similarly, a Microsoft Exchange vulnerability (CVE-2021-42321), demonstrated at the same event but not detailed publicly, was exploited in the wild just days after the competition. Leaks from i-SOON further confirm that vulnerabilities identified during the 2021 event were transferred to the Ministry of Public Security, proving the integral role of CTF events in China's offensive security ecosystem. Using our interactive map This report accompanies an interactive map released on the Orange Cyberdefense CERT Research website. This visualization tool is designed to illustrate the complex relationships within the Chinese cyber ecosystem. As of October 2024, the map includes over 300 nodes, namely: Chinese state entities (42) Vulnerability Databases (12) Private companies (171) Front companies (19) Universities (24) Cyber Competitions (39) Civilian Hacking groups (7) Cyber Ranges (2) The map is fully interactive, allowing users to easily explore nodes using mouse navigation or search filters such as tags, location, and pipelines. Tags include identifiers of intrusion sets and/or known threat groups, including: APT1 APT2 APT3 APT10 APT14 APT17 APT19 APT26 APT27 APT30 APT31 APT40 APT41 Circuit Panda Nomad Panda Dragnet Panda Stalker Panda Karma Panda Ethereal Panda LuckyCat Pipelines designate all nodes associated to activities surrounding the CNNVD and CNVD vulnerability databases. CNNVD contributors are split into the three tiers mentioned above. Locations refer to both the specific city (if known) where the actor is located, as well as the broader region. We have chosen to regroup these locations into five theaters, aligned with the military theater commands of the PLA. This consolidation can be particularly insightful as it illustrates the distinct focuses and areas of targeted operations, including for non-PLA nodes. Figure 4: The Five Theatre Commands of China's People Liberation Army. More than 400 relationships are featured and detailed, each represented by clickable arrows that link the nodes, as well as listed in each node's description. Each relationship is accompanied by a detailed description and a confidence level (low, medium, high), based on our assessment of the source's overall reliability or relevance. The data for these nodes and relationships come from a broad analysis of publicly available academic publications, open-source intelligence (OSINT), and CTI literature on the Chinese cyber ecosystem. This project is the result of more than 8 months of research, data collection and analysis. However, it is important to remember that the map will never be exhaustive, due to our limited visibility and to the very nature of this obscure threat ecosystem. Users can partially download the underlying database through the “Export” button located on the left of the query panel if needed. Sources Adam KOZY, " Two Birds, One STONE PANDA " , CrowdStrike, 08/30/2018. Adam KOZY, " Testimony before the U.S.-China Economic and Security Review Commission Hearing on "China's Cyber Capabilities: Warfare, Espionage, and Implications for the United States " , 02/17/2022. Alex JOSKE, " State security departments: The birth of China's nationwide state security system " , in Deserepi: Studies in Chinese Communist Party external work , 09/27/2023. Alex JOSKE, Charlie Lyons JONES, Audrey FRITZ, Elsa KANIA and Dr Samantha HOFFMAN, " China Defence Universities Tracker " , Australian Strategic Policy Institute, 11/25/2019. Dakota CARY, " Academics, AI, and APTs How Six Advanced Persistent Threat-Connected Chinese Universities are Advancing AI Research " , Center for Security and Emerging Technology, 03/2021. Dakota CARY, " China's CyberAI Talent Pipeline " , Center for Security and Emerging Technology, 07/2021. Dakota CARY, " Downrange: A Survey of China's Cyber Ranges " , Center for Security and Emerging Technology, 09/2022. Dakota CARY, " Testimony before the U.S.-China Economic and Security Review Commission Hearing on "China's Cyber Capabilities: Warfare, Espionage, and Implications for the United States " , 02/17/2022. Dakota CARY, Aleksandar MILENKOSKI, " Unmasking I-Soon - The Leak That Revealed China's Cyber Operations " , SentinelOne, 02/21/2024. Dakota CARY, Eugenio BENINCASA , " Capture the (red) flag: An inside look into China's hacking contest ecosystem " , Atlantic Council, 10/18/2024. Dakota CARY, Eugenio BENINCASA ," Capture the (red) flag: How hacking contests enhance China's cyber capabilities " , Atlantic Council, 10/18/2024 . Dakota CARY, Kristin DEL ROSSO, " Sleight of hand: How China weaponizes software vulnerabilities " , Atlantic Council, 09/06/2023. Eleanor OLCOTT, Helen WARELL, " China lured graduate jobseekers into digital espionage " , Financial Times, 06/30/2022. Eugenio BENINCASA, " From Vegas to Chengdu: Hacking Contests, Bug Bounties, and China's Offensive Cyber Ecosystem " , Center for Security Studies (CSS) of ETH Zürich, 06/2024. Farmpoet, " Twitter " , 08/22/2024. HarfangLab, " A comprehensive analysis of I-Soon's commercial offering " , 03/01/2024. Insikt Group, " China's Cybersecurity Law Gives the Ministry of State Security Unprecedented New Powers Over Foreign Technology " , Recorded Future, 08/31/2017. Insikt Group, " China's Ministry of State Security Likely Influences National Network Vulnerability Publications " , Recorded Future, 11/16/2017. Intrusion Truth, " What is the Hainan Xiandun Technology Development Company? " , 01/09/2020. Joe MCREYNOLDS, John COSTELLO, " Planned Obsolescence: The Strategic Support Force In Memoriam (2015-2024) " , China Brief , Volume: 24 Issue: 9, 04/26/2024. John CHEN, " Testimony before the U.S.-China Economic and Security Review Commission Hearing on "China's Cyber Capabilities: Warfare, Espionage, and Implications for the United States", " 02/17/2022. Ken DUNHAM, Jim MELNICK, " 'Wicked Rose' and the NCPH Hacking Group " , 11/2012. Mandiant, " APT1: Exposing One of China's Cyber Espionage Units " , 02/19/2013. Michael DAHM, " A Disturbance in the Force: The Reorganization of People's Liberation Army Command and Elimination of China's Strategic Support Force " , China Brief , Volume: 24 Issue: 9, 04/26/2024. Microsoft, " Microsoft Digital Defense Report 2022 " , 11/04/2022. Natto Team, " i-SOON: "Significant Superpower" or Just Getting the Job Done? " , 03/08/2024. Natto Team, " i-SOON: Another Company in the APT41 Network " , 10/27/2023. Natto Team, Eugenio BENINCASA, " Matrix Cup: Cultivating Top Hacking Talent, Keeping Close Hold on Results " , 07/24/2024. Nigel INKSTER, " The Chinese Intelligence Agencies: Evolution and Empowerment in Cyberspace " , in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain , 04/23/2015. Nigel INKSTER, China's Cyber Power , 05/06/2016. Patrick HOWELL O'NEILL, " How China turned a prize-winning iPhone hack against the Uyghurs " , MIT Technology Review, 05/06/2021. Robert SHELDON, Joe MCREYNOLDS, " Civil-Military Integration and Cybersecurity: A Study of Chinese Information Warfare Militias " , in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain , 04/23/2015. Stewart SCOTT, Sara Ann BRACKETT, Yumi GAMBRILL, Emmeline NETTLES, Trey HERR, " Dragon tails: Preserving international cybersecurity research " , Atlantic Council, 09/14/2022. ThreatConnect, " The Anthem Hack: All Roads Lead to China " , 02/27/2015. Tim MAURER, " Change Over Time: China's Evolving Relationships with Cyber Proxies " , in Cyber Mercenaries: The State, Hackers, and Power , 12/21/2017. US Justice Department, " Seven International Cyber Defendants, Including "APT41" Actors, Charged In Connection With Computer Intrusion Campaigns Against More Than 100 Victims Globally " , 09/16/2020. US Treasury, " Treasury Sanctions China-Linked Hackers for Targeting U.S. Critical Infrastructure " , US government, 03/25/2024. Winnona BERNSEN, " Same Same, but Different " , Margin Research, 02/29/2024 More food for thought Security Navigator Research & Intelligence World Watch Managed Cybercrime Monitoring Close Press Affairs The Cybercrime Now graph is a free tool produced by Orange Cyberdefense on a best-effort to inform and educate. The graph application, exported images and text are all available to use free of charge as per the Terms of Use provided below. We invite you to use the graph and the information contained therein to enhance your own research, presentations and writing, and ask only that you offer appropriate credit where its due. Terms of Use © Please credit any content used from Cybercrime Now to "Threat intelligence provided by Orange Cyberdefense 2024." For any assistance, journalists can benefit from Orange Cyberdefense experts by contacting press contact: [email protected] This graph is an ongoing project, and we recognise that there will be errors and omissions, which we will endeavour to correct when we can. Please notify us of bugs, errors or suggestions by contacting us ." Legal Notice Editor Orange Cyberdefense SA Société anonyme with registered share capital of 463.122.713 euros RCS Nanterre 892377532 54 Place de l'Ellipse 92000 Nanterre, France Phone: +33 1 44 44 22 22 Hosting provider Google Cloud France ROS Paris 881/21583 8 Rue de Londres, 75009 Paris, France Publishing director Hugues Foulon Privacy Policy This privacy policy describes how Orange Cyberdefense (”Orange Cyberdefense“ or “we”) collects and uses the personal data which you either leave through footprints and/or provide when you visit our website, orangecyberdefense.com, and use the various services and activities we offer. Collection of personal data Use of personal data, purpose and legal basis Retention Consent Security Your rights Links to other websites Amendments of this privacy policy Contact 1. Collection of personal data We always inform you before we collect your personal data. We collect the following personal data about you: name, email address, telephone number, job title, company name, and food preferences. We may collect other personal data if deemed necessary to complete specific events. In such cases we will always inform you before collection the personal data. Please note that some personal data is necessary to collect in order for you to use the functions of the website. Each of the relevant formulas will indicate whether it is mandatory or optional for you to provide the personal data. If providing the personal data is mandatory, the relevant field will be marked by a star (*). If you decide not to provide the personal data in question, you may not be able to use the function. For instance, you must provide your contact information in order for us to reply to a request from you. If you provide personal data on other persons than yourself, you must ensure that you collect consent to provide us the personal data from the relevant persons. Personal data will be collected when you use the activities listed below: When you subscribe to our newsletter When you download documents When you sign up for events When you sign up for our academy When you fill in a contact form for activities such as sales quotations and surveys 2. Use of personal data, purpose and legal basis When you use our website personal data could be collected and may be used for the following purposes: Newsletters and other promotional communication Promotional marketing in general Handling requests received from you Providing customer support and communication Product and service development Statistics and analytics Administration of user accounts The processing of your personal data will often be necessary to comply with your request or to perform our services. We note that Orange Cyberdefense will only use your personal data for marketing activities if you have given a prior and explicit consent to such use. In certain circumstances and according to legislation it may be necessary to disclose data to public authorities. We may also disclose your personal data in order to establish, exercise or defend our legal rights. Furthermore, your personal data will be disclosed to all legal entities of Orange Cyberdefense (“Orange Cyberdefense”): Orange Cyberdefense Switzerland CH (Switzerland) Orange Cyberdefense Netherlands B.V. (The Netherlands) Orange Cyberdefense Belgium (Belgium) Orange Cyberdefense UK Limited (United Kingdom) Orange Cyberdefense Sweden AB (Sweden) Orange Cyberdefense Denmark A/S (Denmark) Orange Cyberdefense Norway AS (Norway) Orange Cyberdefense Germany GmbH (Germany) Orange Cyberdefense France (France) Orange Cyberdefense SA Your personal data may be disclosed to legal entities of Orange Cyberdefense outside of the European Union under your express consent: Orange Cyberdefense South Africa (PTY) Ltd Orange Cyberdefense (Shanghai) Co., Ltd In the event of reorganisation or total or partial sale of the business, disclosure, if any, will in such connection take place in accordance with the legislation governing such processing of personal data at the time in question and, if legally required, we will seek your consent. Cookies We use cookies on our website. You can learn more about our use of cookies in our Cookie Policy. 3. Retention Orange Cyberdefense will delete your personal data when we no longer need your personal data in order to fulfill the above mentioned purposes. However, we may process your personal data for longer in an anonymized form or if we are obliged or entitled to do so pursuant to the legislation. 4. Consent When you use our website, we sometimes collect and process your personal data based on your consent. Please note that you may withdraw your consent at any time. Please contact us, if you wish to withdraw your consent. If you wish to withdraw your consent as described above, please contact us (see contact information section 9 below). If you withdraw your consent, we will stop the processing of your personal data, unless we are entitled or obliged to continue the processing or storage of your personal data on another legal basis, e.g. pursuant to legislation. Withdrawal of your consent will not affect the lawfulness of the processing prior to the withdrawal. If you withdraw your consent, you may not be able to use the functions offered on our website in full. 5. Security We have implemented appropriate technical and organizational security measures to ensure an adequate security level and require that trusted third parties who process your personal information do the same. Accordingly, we use our best efforts to ensure the confidentiality and integrity of your personal data. 6. Your rights You have a right of access to the personal data, which we process and store about you, subject to certain statutory exceptions. Furthermore, you have the right to object to the collection and further processing of your personal data. Moreover, you have the right to rectification of your personal data, or to require us to restrict the processing of your personal data. If you so request, we will erase the personal data which we have registered on you without undue delay, unless we may continue the processing on another legal basis, e.g. if the processing is necessary to defend a legal claim or to comply with a request from you. Under certain circumstances, you may also request that we provide you with an overview of your personal data in a structured, commonly used and machine-readable format and request us to transmit such data to either you or to another data controller. If you wish to exercise your rights as described above, please contact us (see contact information section 9 below). In connection with requests regarding your rights, we kindly ask you to provide us with sufficient information in order for us to handle your request, including name and email address, and to identify you. If necessary, we may ask for further information. We will reply to your request as soon as possible and no later than one (1) month. If you disagree with how we process your personal data or the purposes for which we process your personal data, you may either contact us, take legal actions at the ordinary courts or you may lodge a complaint with the data protection authority of your country. 7. Links to other websites Our website may contain links to other websites. We are not responsible for the content of other websites (third party websites) or for the procedures of such third parties for collecting and processing personal data. If you visit a website of a third party, you should read the privacy policy and other relevant policies of the owner of the website. 8. Amendments of this Privacy Policy We reserve the right to amend this privacy policy based on substantial changes in the legislation, new technical solutions, new or improved functions and to improve the website. Cookie Policy A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first party cookies. We also use third party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes: Assisting you in navigation; Assisting in registration to our events and your ability to provide feedback; Analyzing your use of our site; Assisting with our promotional and marketing efforts. Below is a detailed list of the cookies we use on our Website. Our Website is scanned with our cookie scanning tool regularly to maintain a list as accurate as possible. We classify cookies in the following categories: Strictly Necessary Cookies Performance Cookies Functional Cookies Targeting Cookies Cookie Settings Anti-corruption Orange has zero tolerance towards corruption We want to build tomorrow's digital world as a trusted and responsible company. We are committed to building a healthy business environment that is delivered with integrity and in line with our Company's Code of Ethics; as part of this we adopt a policy of zero tolerance to corruption in all of our business activities across the Group. This policy applies to all of us, including those who act on our behalf. All management must take an active leadership role to create a culture where corruption cannot thrive and is unacceptable in all forms. This Policy must be communicated widely, promoted strongly and supported with excellent training initiatives in order to ensure it is thoroughly understood and complied with by all. Downloads Code of Ethics Anti-corruption Policy Disclaimer Website Disclaimer This website, together with its tools, is provided by Orange Cyberdefense on an “as is” basis. Orange Cyberdefense makes no representations or warranties of any kind, express or implied, as to the operation of the site, the information, content, materials, tools, services and/or products included on the website. Orange Cyberdefense disclaims, to the full extent permissible by applicable law, all warranties, express or implied, including but not limited to, implied warranties of merchantability and fitness for a particular purpose. Orange Cyberdefense cannot be held liable for any damages of any kind arising from the use of this website and its tools, including but not limited to direct, indirect, incidental, punitive, and consequential damages. Copyright All content on this site, including text, graphics, logos, icons, images, audio clips, and software, is the property of Orange Cyberdefense, any legal entities of Orange Cyberdefense or its content suppliers and is protected by copyright laws. The compilation (meaning the collection, arrangement, and assembly) of all content on this site is the exclusive property of Orange Cyberdefense and is protected by copyright laws . All software used on this site is the property of Orange Cyberdefense, any legal entities of Orange Cyberdefense or its software suppliers and protected by copyright laws. The content and software on this site may be used as a resource, stating clear references. Any other use, including the reproduction, modification, distribution, transmission, republication, display, or performance, of the content on this site is strictly prohibited. Trademarks The Orange Cyberdefense name, Orange Cyberdefense logo and any other Orange Cyberdefense product or service names or logos used on the orangecyberdefense.com website are registered trademarks of Orange Brand Services Limited, a company of Orange group. Terms and Conditions --> Connect with us Visit, call or e-mail our global office We are happy to help you during office hours and 24 hours a day 7 days a week at our incident response hotline. 54 Place de l'Ellipse 92983 Paris La Défense +33 (0)1 46 53 53 53 [email protected] Facing an emergency right now? Call our incident response hotline .