Transcript
Dave Bittner (0:02)
You're listening to the CyberWire network.
Kyla Cardona (0:04)
Powered by N2K ransomware, supply chain attacks and zero day exploits can strike without warning, leaving your business's sensitive data and digital assets vulnerable. But imagine a world where your cybersecurity strategy could prevent these threats. That's the power of the ThreatLocker zero trust endpoint protection platform. Robust cybersecurity is a non negotiable to safeguard organizations from cyberattacks. ThreatLocker implements a proactive, deny by default approach to cybersecurity, blocking every action process end user unless specifically authorized by your team. This least privilege methodology mitigates the exploitation of trusted applications and ensures protection for your organization. 2473655 IT professionals are empowered by Threat Locker Application allow listing, ring fencing, network control and EDR solutions, enhancing their cybersecurity posture and streamlining internal IT and security operations. To learn more about how ThreatLocker can help mitigate unknown threats in your digital environment and align your organization with respected compliance frameworks, visit threatlocker.com hello everyone and welcome to the Cyberwires Research Saturday. I'm Dave Bittner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems, and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
Aurora Johnson (2:01)
We looked at China's data breach and leak ecosystem and we discovered that there's a lot of interesting differences between the Chinese speaking cybercrime world and the Russian and English speaking cybercrime worlds. We found that their cybercrime ecosystem depends a lot more on persistent access, often persistent insider access directly to data sources and that they often siphon off this data and sell it on the black market.
Kyla Cardona (2:32)
In today's sponsored Industry Voices research Saturday, we speak with Kyla Cardona and Aurora Johnson from Spy Cloud. The research is titled China's Surveillance State is Selling Citizen Data as a side Hustle.
Dave Bittner (2:53)
So as a security researcher I'm curious by nature.
Kyla Cardona (2:56)
So that's Kyla Cardona.
Dave Bittner (2:58)
When I went on the platforms like Breach Forums and other illicit platforms on Telegram that we know of on the Western Russian European side, I would see small bits of Chinese data and I was curious. I was like there needs, you know, there has to be more where this came from. And so I took some clues and I did some deep diving and I uncovered a very different cyber crime ecosystem. And the way that they have they prefer firsthand data or fresh data rather than data that is hacked or leaked. So they prefer that because they say that it's Directly from the source. So they have two different major exfiltration methods known as SDK, which is backend permissions on apps mostly, and dpi, which is deep packet inspection, which is done through major telecom centers in China like China Unicom, China Mobile and China Telecom. So there's insiders on both ends of that spectrum that exfiltrate data daily is allegedly is what they say, and that's the data that is sold, traded, and also used to funnel these Shabong coups or SGKs that are these lookup queries that are public and private. So when it comes to the, when we compare it to the Western European, Russian side, which mostly consists of hacked or leaked data, data breaches from people or malicious cyber actors, it's different when you compare it to the Chinese one, because when it comes to Chinese, those actors, they prefer data directly from the source and they call the databases that we call data breaches secondhand data because they don't essentially believe that it could be like they question the credibility on that kind of data because it is, you know, from a hacking method or a penetration tool. And they also have this obfuscation tactic. So if they were to breach a website, then they would name it by the industry rather than the actual website. And this is, we believe that this is an obfuscation tactic because in order to preserve their access to that website, they don't want to name it, they'd rather name it by industry rather than the actual website itself, which is the opposite of what you see people doing on breach forums for leaked, for hacked and leaked data data breaches, because those are usually named by the website itself.
![The hidden cost of data hoarding. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F58ab7ae0-def8-11ea-b34c-b35b208b0539%2Fimage%2Fdaily-podcast-cover-art-cw.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)