Logo
    Search

    Podcast Summary

    • The corporatization of state-sponsored hackingChinese state-sponsored hacking-for-hire organization iSun's leaks revealed it hacked governments and individuals globally, shifting focus from clandestine entity to a business operation.

      State-sponsored hacking can be corporatized, turning it into a business operation. This was highlighted in the iSun data leak, which revealed the inner workings of a Chinese state-sponsored hacking-for-hire organization. Initially, the image of state-sponsored hacking might evoke thoughts of a clandestine, imposing structure. However, as states outsource their cyber operations, they increasingly rely on private sector vendors and consultants. The iSun leaks provided an unprecedented look into this world, revealing the company's involvement in hacking governments and individuals across the globe, including in Rwanda, Indonesia, Malaysia, Thailand, Vietnam, Cambodia, Nigeria, Mongolia, Myanmar, Taiwan, India, and Kyrgyzstan. This corporateization of state-sponsored hacking shifts the focus from a shadowy, mysterious entity to a more tangible business operation. May Wendowski, a cybersecurity researcher, was among the first to delve into the iSun files and her analysis served as the foundation for much of the subsequent reporting on the topic. As we continue to grapple with the evolving threat landscape of Chinese cyber operations, understanding the corporatization of state-sponsored hacking is crucial.

    • Chinese cybersecurity company, ISun, exposed in leaked documents on GitHubISun, a Chinese info sec company, revealed to offer gov't projects, DDoS attacks, and social media monitoring, beyond stated services, based on leaked GitHub docs.

      ISun, a Chinese information security company, has been revealed to have provided services beyond what's stated on their website, including involvement in government projects, DDoS attacks, and social media monitoring. The company, headquartered in Shanghai with subsidiaries across China, has been a significant player in China's hacker-for-hire industry, as evidenced by leaked documents on GitHub. These leaks provided a unique insight into the inner workings of iSun and the Chinese cyber threat landscape, shedding light on the diversity of services offered and their potential role in state-sponsored cyber activities. The leaks served as an invaluable resource for researchers, offering a rare glimpse into the daily operations of a Chinese cybersecurity company.

    • Iseng Technology's proactive role in shaping government contractsIseng's approach to securing government contracts involved late-night drinks and entertainment, regional understanding, and collaboration with competitors.

      Iseng Technology, a Chinese tech company, was involved in providing a range of services to both the government and other companies, including software development, enterprise security, and controversial offerings like DDoS attack software and surveillance services. The leaked communications reveal that Iseng actively courted government officials to secure contracts, engaging in practices like late-night drinks and entertainment to build relationships. This suggests a more proactive role for companies in shaping government contracts than previously understood. The process was complex, requiring understanding of regional officials and competitors, and sometimes involved collaborating with other information companies. Iseng's approach underscores the importance of building relationships and understanding client needs in the competitive tech industry.

    • Chinese hacking groups outsource work to external vendorsChinese hacking groups outsource work to external vendors like Isun and Chengdu 404, creating a decentralized and business-like ecosystem

      State-sponsored hacking in China may not always involve large, organized operations hidden in big buildings. Instead, some groups may outsource their work to external vendors, creating a more decentralized and business-like ecosystem. For instance, the companies Isun and Chengdu 404, which have been linked to advanced persistent threat groups, operate in a similar manner to ice cream, with close connections, shared resources, and even social interactions. Despite being indicted in 2020, these companies continued their activities, expanding their businesses and hiring more employees. The leaks do not necessarily indicate the absence of more formal state-sponsored hacking, but they do offer insights into a different aspect of the cyber threat landscape in China.

    • Hacking-for-hire industry and its links to APT 41The hacking-for-hire industry involves companies offering hacking services, with APT 41 linked to Chengdu 404. Legality is unclear due to government contracts, raising ethical concerns and emphasizing the need for strong cybersecurity measures.

      The cybersecurity landscape involves a complex ecosystem of companies, some of which offer hacking services for hire. APT 41, a known hacking group, is identified as being linked to Chengdu 404, a company that has been indicted for providing such services. The legality of these activities within China is unclear, as they are often carried out under government contract. This intricate web of businesses and governments raises significant questions about the ethical implications and potential consequences of the hacking-for-hire industry. It also underscores the importance of robust cybersecurity measures and the need for ongoing vigilance against emerging threats. Additionally, this episode was brought to you by Shopify, and organizations like the Center for Internet Security are working to provide resources and collaborate with IT professionals to help businesses navigate the ever-evolving cybersecurity landscape.

    • State-sponsored hacking groups like APT 31 remain a significant threatUnderstanding motivations and objectives of state-sponsored hacking groups is crucial for prevention efforts. Collaboration between public and private sectors is necessary to stay ahead of threat actors and protect against damage.

      State-sponsored hacking groups, such as APT 31, continue to pose a significant threat to various entities around the world, with China being a notable source of these campaigns. These groups are active, persistent, and seemingly unstoppable, as new groups emerge when others are identified and taken down. Understanding the motivations and objectives of these hacking groups is crucial for prevention and mitigation efforts. Despite the limitations of current strategies like naming and shaming, the cybersecurity community continues to explore effective methods for combating this global threat. The scale and complexity of these campaigns require a collaborative effort from both the public and private sectors to stay ahead of the threat actors and protect against potential damage.

    • Protecting Economic Targets from Cyber EspionageIdentify a company's 'crown jewel' assets and prioritize their protection from cyber threats. Understand the sources of funding for cyber campaigns to determine motivations and intentions.

      While political and cyber aggression in the context of nation competition can be difficult to stop, it's essential to prioritize the protection of economic targets from cyber espionage. By identifying a company's "crown jewel," or most valuable assets, organizations can better defend against potential threats. Moreover, understanding the sources of funding for these campaigns is crucial in determining motivations and intentions. Regarding the specific company discussed, it appears to be a high-stress environment with low pay and a struggling business model. Despite the politically contentious nature of the industry, the company's employees and subsidiaries have faced financial losses for several years. These findings might be surprising, given the common assumption that high-stakes businesses offer substantial financial rewards. However, the research underscores the importance of understanding the realities of these organizations to protect against potential threats.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    ISC StormCast for Tuesday, April 2nd 2019

    ISC StormCast for Friday, September 28th 2018

    059: Warum ist Cyber Security Chefsache, Nico Werner (All-in Digital & CloudCommand)?

    059: Warum ist Cyber Security Chefsache, Nico Werner (All-in Digital & CloudCommand)?
    In der heutigen Interview-Folge des Tech-Podcasts "Blue Screen" begrüßen wir Nico Werner als unseren Gast. Nico ist ein bekannter Podcaster und beschäftigt sich mit dem Thema "Cyber Security ist Chefsache". Da wir uns beide mit IT- und OT-Themen, insbesondere Industrie 4.0, beschäftigen, ist es eine spannende Gelegenheit, uns auszutauschen.

    🔴 May 5's Top Cyber News NOW! - Ep 360

    🔴 May 5's Top Cyber News NOW! - Ep 360

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.

    Check out Barricade Cyber if you need incident response, ransomware protection, or business recovery assistance
    https://barricadecyber.com.

    Build an evidence-based and data-driven cyber security program with Panoptcy's Quantified Risk Assessments!
    https://panoptcy.com/

    Discover the most critical threats and tips on how to overcome remediation fatigue with XM Cyber’s 2023 State of Exposure Management report https://bit.ly/3KS0uWs

    Gerald’s practical skills course with no prerequisites - GRC Analyst Master Class - https://simplycyber.teachable.com

    💥Get 30% off ITPro from ACI Learning with coupon code “SIMPLYCYBER30” Binge-worthy cybersecurity education ! https://go.itpro.tv/simplycyber

    Join the Simply Cyber Discord  https://SimplyCyber.io/Discord

    Podcast in stream is from cisoseries.com.