Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 3
49 résultats taggé cyberwar  ✕
How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies https://www.wired.com/story/china-honkers-elite-cyber-spies/
21/07/2025 08:30:23
QRCode
archive.org
thumbnail

In the summer of 2005, Tan Dailin was a 20-year-old grad student at Sichuan University of Science and Engineering when he came to the attention of the People’s Liberation Army of China.

Tan was part of a burgeoning hacker community known as the Honkers—teens and twentysomethings in late-’90s and early-’00s China who formed groups like the Green Army and Evil Octal and launched patriotic cyberattacks against Western targets they deemed disrespectful to China. The attacks were low-sophistication—mostly website defacements and denial-of-service operations targeting entities in the US, Taiwan, and Japan—but the Honkers advanced their skills over time, and Tan documented his escapades in blog posts. After publishing about hacking targets in Japan, the PLA came calling.

The subsequent timeline of events is unclear, but Tan, who went by the hacker handles Wicked Rose and Withered Rose, then launched his own hacking group—the Network Crack Program Hacker (NCPH). The group quickly gained notoriety for winning hacking contests and developing hacking tools. They created the GinWui rootkit, one of China’s first homegrown remote-access backdoors and then, experts believe, used it and dozens of zero-day exploits they wrote in a series of “unprecedented” hacks against US companies and government entities over the spring and summer of 2006. They did this on behalf of the PLA, according to Adam Kozy, who tracked Tan and other Chinese hackers for years as a former FBI analyst who now heads the SinaCyber consulting firm, focused on China.

Tan revealed online at the time that he and his team were being paid about $250 a month for their hacking, though he didn’t say who paid or what they hacked. The pay increased to $1,000 a month after their summer hacking spree, according to a 2007 report by former threat intelligence firm VeriSign iDefense.

At some point, Tan switched teams and began contracting for the Ministry of State Security (MSS), China’s civilian intelligence agency, as part of its notorious hacking group known as APT 41. And in 2020, when Tan was 36, the US Justice Department announced indictments against him and other alleged APT 41 members for hacking more than 100 targets, including US government systems, health care organizations, and telecoms.

Tan’s path to APT 41 isn’t unique. He’s just one of many former Honkers who began their careers as self-directed patriotic hackers before being absorbed by the state into its massive spying apparatus.

Not a lot has been written about the Honkers and their critical role in China’s APT operations, outside of congressional testimony Kozy gave in 2022. But a new report, published this month by Eugenio Benincasa, senior cyberdefense researcher at the Center for Security Studies at ETH Zürich university in Switzerland, expands on Kozy’s work to track the Honkers’ early days and how this group of skilled youths became some of China’s most prolific cyberspies.

“This is not just about [Honkers] creating a hacker culture that was implicitly aligned with national security goals,” Benincasa says, “but also the personal relations they created [that] we still see reflected in the APTs today.”

Early Days
The Honker community largely began when China joined the internet in 1994, and a network connecting universities and research centers across the country for knowledge-sharing put Chinese students online before the rest of the country. Like US hackers, the Honkers were self-taught tech enthusiasts who flocked to electronic bulletin boards (dial-up forums) to share programming and computer hacking tips. They soon formed groups like Xfocus, China Eagle Union, and The Honker Union of China and came to be known as Red Hackers or Honkers, a name derived from the Mandarin word “hong,” for red, and “heike,” for dark visitor—the Chinese term for hacker.

Wired EN 2025 cyberwar cybersecurity national espionage hacking Honkers China
Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities | WIRED https://www.wired.com/story/cyber-army-of-russia-reborn-sandworm-us-cyberattacks/
18/04/2024 07:08:54
QRCode
archive.org
thumbnail

Cyber Army of Russia Reborn, a group with ties to the Kremlin’s Sandworm unit, is crossing lines even that notorious cyberwarfare unit wouldn’t dare to.

wired EN 2024 infrastructure hackers russia critical cyberwar cyberattacks ukraine
The International Criminal Court Will Now Prosecute Cyberwar Crimes https://www.wired.com/story/icc-cyberwar-crimes/
10/09/2023 16:03:33
QRCode
archive.org
thumbnail

FOR YEARS, SOME cybersecurity defenders and advocates have called for a kind of Geneva Convention for cyberwar, new international laws that would create clear consequences for anyone hacking civilian critical infrastructure, like power grids, banks, and hospitals. Now the lead prosecutor of the International Criminal Court at the Hague has made it clear that he intends to enforce those consequences—no new Geneva Convention required. Instead, he has explicitly stated for the first time that the Hague will investigate and prosecute any hacking crimes that violate existing international law, just as it does for war crimes committed in the physical world.

wired EN 2023 International Criminal Court ICC Prosecute Cyberwar Crimes legal
The Cheap Radio Hack That Disrupted Poland’s Railway System https://www.wired.com/story/poland-train-radio-stop-attack/
29/08/2023 22:26:19
QRCode
archive.org
thumbnail

The sabotage of more than 20 trains in Poland by apparent supporters of Russia was carried out with a simple “radio-stop” command anyone could broadcast with $30 in equipment.

wired EN 2023 Poland sabotage cyberwar Russia-Ukraine-war radio-stop
Inside the secret cyberwar against Putin’s regime https://archive.md/l0Jvx
12/07/2023 08:48:20
QRCode
archive.org
thumbnail

Breaches in Russia’s digital defences show the West is not alone in its vulnerability to hackers

telegraph.co.uk Russia Russia-Ukraine-war cyberwar deepfake Kaspersky
A year after Russia's invasion, the scope of cyberwar in Ukraine comes into focus https://cyberscoop.com/ukraine-russia-cyberwar-anniversary/
25/02/2023 10:33:15
QRCode
archive.org
thumbnail

The Ukraine war has inspired a defensive cyber effort that government officials and technology executives describe as unprecedented.

cyberscoop EN 2023 russia-ukraine-war cyber-effort unprecedented Ukraine cyberwar
Iran’s cyberwar goes global https://www.economist.com/middle-east-and-africa/2022/09/14/irans-cyberwar-goes-global
15/09/2022 21:38:58
QRCode
archive.org
thumbnail

Its targets include not only Israel but at least one NATO member

economist EN 2022 cyber-assault cyber-attacks cyberwar geopolitics
Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine https://securityintelligence.com/posts/trickbot-group-systematically-attacking-ukraine/
07/07/2022 18:45:17
QRCode
archive.org
thumbnail

Following ongoing research our team, IBM Security X-Force has uncovered evidence indicating that the Russia-based cybercriminal syndicate “Trickbot group” has been systematically attacking Ukraine since the Russian invasion — an unprecedented shift as the group had not previously targeted Ukraine

Securityintelligence EN 2022 cyberwar Russia-Ukraine-war trickbot Ukraine
Defending Ukraine: Early Lessons from the Cyber War https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/
23/06/2022 07:03:23
QRCode
archive.org
thumbnail

This report represents research conducted by Microsoft’s threat intelligence and data science teams with the goal of sharpening our understanding of the threat landscape in the ongoing war in Ukraine. The report also offers a series of lessons and conclusions resulting from the data gathered and analyzed. Notably, the report reveals new information about Russian efforts including an increase in network penetration and espionage activities amongst allied governments, non-profits and other organizations outside Ukraine. This report also unveils detail about sophisticated and widespread Russian foreign influence operations being used among other things, to undermine Western unity and bolster their war efforts. We are seeing these foreign influence operations enacted in force in a coordinated fashion along with the full range of cyber destructive and espionage campaigns. Finally, the report calls for a coordinated and comprehensive strategy to strengthen collective defenses – a task that will require the private sector, public sector, nonprofits and civil society to come together. The foreword of this new report, written by Microsoft President and Vice Chair Brad Smith, offers additional detail below.

microsoft EN 2022 cyberwar Russia-Ukraine-war espionage report influence operations cyberoperations
Russia's APT28 uses fear of nuclear war to spread Follina docs in Ukraine https://blog.malwarebytes.com/threat-intelligence/2022/06/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine/
21/06/2022 17:33:19
QRCode
archive.org
thumbnail

Threat actors associated with Russian intelligence are using the fear or nuclear war to spread data-stealing malware in Ukraine.

malwarebytes EN 2022 Follina Russia cyberwar Ukraine Russia-Ukraine-war
What It Means that the U.S. Is Conducting Offensive Cyber Operations Against Russia https://zetter.substack.com/p/what-it-means-that-the-us-is-conducting
18/06/2022 10:38:58
QRCode
archive.org
thumbnail

Gen. Paul Nakasone's remarks this month about offensive operations against Russia caused a stir. But have people misinterpreted his words?

Zetter newsletter EN 2022 cyberoperations definition Nakasone offensive TallinManual Russia US cyberwarfare cyberwar
Cyberattaques: «Il s'agit davantage de terrorisme que de crime organisé» https://www.letemps.ch/economie/cyberattaques-sagit-davantage-terrorisme-crime-organise
02/06/2022 19:32:06
QRCode
archive.org
thumbnail

Les autorités russes vont relâcher les membres du gang de cybercriminels Revil, et même les embaucher pour leur propre compte. Stéphane Duguin, directeur du CyberPeace Institute de Genève, commente ce rebondissement

letemps FR 2022 Revil cyberwar Russie gang crime-organisé cybercriminels
US military hackers conducting offensive operations in support of Ukraine, says head of Cyber Command https://news.sky.com/story/us-military-hackers-conducting-offensive-operations-in-support-of-ukraine-says-head-of-cyber-command-12625139
02/06/2022 11:02:44
QRCode
archive.org
thumbnail

In an exclusive interview with Sky News, General Paul Nakasone confirmed for the first time that the US had "conducted a series of operations" in response to Russia's invasion of Ukraine.

skycom 2022 EN offensive operations cyberoperations cyberwar offensive-operations US russia-ukraine-war
The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine https://www.mandiant.com/resources/information-operations-surrounding-ukraine
21/05/2022 22:51:07
QRCode
archive.org
thumbnail

New Mandiant research detailing the various IO activities seen by nation-state actors, resulting from the Russian invasion of Ukraine.

mandiant EN 2022 Information Operations russia-ukraine-war research IO activities cyberwar
Russia hacked an American satellite company one hour before the Ukraine invasion https://www.technologyreview.com/2022/05/10/1051973/russia-hack-viasat-satellite-ukraine-invasion
11/05/2022 14:08:50
QRCode
archive.org
thumbnail

The attack on Viasat showcases cyber’s emerging role in modern warfare.

technologyreview EN 2022 cyberwar russia-ukraine-war Viasat satellite warfare
Russian troops in Melitopol plunder $5M farm vehicles from Ukraine -- to find they've been remotely disabled https://edition.cnn.com/2022/05/01/europe/russia-farm-vehicles-ukraine-disabled-melitopol-intl/index.html
02/05/2022 15:44:49
QRCode
archive.org
thumbnail

Russian troops in the occupied city of Melitopol have stolen all the equipment from a farm equipment dealership -- and shipped it to Chechnya, according to a Ukrainian businessman in the area.

CNN EN cyberwar farm vehicles JohnDeere locked remotely Russia
Russia’s Sandworm hackers attempted a third blackout in Ukraine https://arstechnica.com/information-technology/2022/04/russias-sandworm-hackers-attempted-a-third-blackout-in-ukraine/
13/04/2022 09:00:34
QRCode
archive.org
thumbnail

The attack was the first in five years to use Sandworm's Industroyer malware.

Sandworm Industroyer arstechnica 2022 EN cyberwar Ukraine blackout malware ICS
Industroyer2: Industroyer reloaded https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/
12/04/2022 15:38:40
QRCode
archive.org
thumbnail

ESET researchers have responded to a cyber-incident that affected an energy provider in Ukraine and involved ICS-capable malware called Industroyer2.

welivesecurity Industroyer2 Industroyer EN 2022 Ukraine cyberwar ICS research
DoS attacks hit Finnish websites during Zelenskyy address • The Register https://www.theregister.com/2022/04/09/dos_attacks_finland_russia/
09/04/2022 14:05:09
QRCode
archive.org
thumbnail

Cyberattacks took down Finnish government websites on Friday while Ukrainian President Volodymyr Zelenskyy addressed Finland's members of parliament (MPs).

theregister EN 2022 Finland Russia DDoS cyberwar
AcidRain | A Modem Wiper Rains Down on Europe https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe/
08/04/2022 09:19:52
QRCode
archive.org
thumbnail

As the most impactful cyber attack of the Ukrainian invasion gets downplayed, SentinelLabs uncovers a more plausible explanation.

sentinelone EN AcidRain Wiper cyberwar Russia analysis
page 1 / 3
4560 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio