Transcript
A (0:00)
Understanding Chinese strategic thinking really becomes crucial for defenders because if you only focus on technical side without understanding the broader strategy context, you're essentially playing defense with a blindfold on. Chinese operations are driven by collection requirement that come from the strategic planning process. They are not random targeting organizations. There are specific intelligence gaps they're trying to fill. Foreign.
B (0:38)
Hello and welcome to another episode of Data Security Decoded. I'm your host Caleb Tolan and we are recording this right after Black Hat. If you attended as well, I hope you had a blast. It's a busy show, lots of great conversations, but I walked away like many with a head cold. So thanks for that. If you attended. Now, if this is your first time joining us, welcome to the show. Make sure you hit that subscribe button so you're notified when new episodes go live. And if you're already a subscriber, thanks for coming back. Give us a rating. Drop a comment below, let us know what you think about the episode. Your feedback is invaluable to us. Now. In this episode, I had the pleasure of sitting down with May Danowski, a geopolitical intelligence expert and co founder of natto. Thoughts. Mei has extensive expertise in Chinese threat actors and has presented her research at the top conferences around the world. Now we had an insightful conversation about how cultural and geopolitical dynamics shape cyber threats, insights into China's cybersecurity strategy and the importance of understanding the intersection of technology and international relations. Now, without further ado, let's dive in. May, thank you for joining. I'm really excited to chat with you because your background and expertise in geopolitical intelligence, particularly in relations to China is so impressive. What is a common misunderstanding about Chinese state backed threat actors that you often hear?
A (1:51)
Well, thank you for having me today. So this actually is a great question to get us started the conversation. A common misunderstanding of Chinese state backed threat actor I have observed over the years is view them as a monolithic and centrally coordinated entities operating under unified command and control. However, in realities the Chinese cyber threat landscape is much more complex and fragmented. So many assume that Chinese cyber operations have unified command structure. All Chinese cyber operations flow from a single source like the pla, the Chinese People's Liberation army or the Ministry of the State Security. In practice, multiple agencies, military units and contract groups operate with various degree of autonomy and the coordinations different units may have competing priorities or overlapping targets. So here I give you an example recent case of the SHRED group Hafnium, also known as the Silk Typhoon. So the link to Chinese hackers Xu Zwei which DOJ already have an indictment about him. So she was arrested in Milan, Italy in early July. So NATO south actually have a detailed report about analysis about him and his career growth and relationship with Hafnium. So she works for the Shanghai Military State Security Bureau which is a local branch of Chinese military Ministry of State Security through a front company Par Rock which was established by the Shanghai Bureau. So the Shanghai State Security Bureau manages the Parrot operations directly from recruitment, tasking and feedback loop structured reporting process is all managed by the State Security. But in Xu's case, one task from the State Bureau was to target COVID 19 research. So the state Secure Bureau gave him who to target to and what information they needed. And she would figure out, you know how to access that information. After each operations she would report back to the bureau the result. So as you know to Chinese threat group, you know, other analysts, you know for example the Dakota Carry from Center One also have a great report about to identify actually other hackers and contract companies also have involved in the Hafnian operations. So it's not like a single company related to this one throw group of one single Ministry of State Security actually is from local branch. So this, you know, when we understand this we had to really know the Chinese cyber operations in March diverse and fragmented even than some of us assumed.
