Natto Thoughts

211 Followers
17 Following
135 Posts
Natto Thoughts explores the intersection of culture, technology and security, with stories, analysis and insights into the humans of the information age—whether decision-makers, criminals, or ordinary users.

The Natto Team's take on the Chinese government’s attitude toward a second term Trump presidency and the potential cyber implications in 2025.

https://nattothoughts.substack.com/p/chinas-trump-cards-for-trump-20

China’s Trump Cards for Trump 2.0

As China braces for upcoming US challenges, cyber escalation is likely

Natto Thoughts

The Natto Team discovered that media outlets mistakenly cited the same authors earlier paper to evaluate the issues. The paper in question was published in September, soon hushed up, shows Chinese researchers may have discovered a class of quantum-annealing algorithm capable of attacking cryptography in a novel way.

https://nattothoughts.substack.com/p/chinas-quantum-tunneling-breakthrough

The Red Dragon Searches for Pearls Through Quantum Tunneling – But You’ve Got the Wrong Paper

A September paper, soon hushed up, shows Chinese researchers may have discovered a class of quantum-annealing algorithm capable of attacking cryptography in a novel way

Natto Thoughts

The Natto Team collaborated with researcher Eugenio Benincasa to examine China's cyber range market and its significance following the exposure of Flax Typhoon-linked company Integrity Technology.

https://nattothoughts.substack.com/p/business-priorities-of-chinese-cyber

Business Priorities of Chinese Cyber Range Providers Go Hand in Hand with State Cyber Capability Development

China’s cyber range market booms, fueled by the state’s demand for developing capable cyber talent and improving the effectiveness of “attack and defense live-fire capability”

Natto Thoughts

Natto Thoughts examines Flax Typhoon and Integrity Technology and questions: how many more Chinese information security companies lie behind Chinese state cyber threat campaigns?

https://nattothoughts.substack.com/p/flax-typhoon-linked-company-integrity

Flax Typhoon-Linked Company Integrity Technology: a Competitor, Business Partner and Client of i-SOON

First i-SOON, then Integrity Tech: How many more Chinese information security companies lie behind Chinese state cyber threat campaigns?

Natto Thoughts

As the Natto Team continues our ongoing research on Chinese threat groups, we discovered several other Chinese threat groups using similar reconnaissance techniques and tools to those APT41 used. We also came across reconnaissance techniques and scanning tools that were unique to some of the Chinese threat groups. In addition, like APT41, Chinese threat groups heavily use open-source and locally developed tools, whether well-known security tools or customized malware.

https://nattothoughts.substack.com/p/reconnaissance-scanning-tools-used

Reconnaissance Scanning Tools Used by Chinese Threat Actors and Those Available in Open Source

China has its own ecosystem of scanning tools, whether for good or ill.

Natto Thoughts
The Natto Team invited Eugenio Benincasa, who has deep knowledge on China's major hacking competitions and bug bounty programs, to co-author this analysis on China's brand-new hacking contest Matrix Cup.

Say you, say me. Can it say together? The Natto Team is afraid to say probably not. Cyber attribution is complicated. It looks as if we have more questions than answers after all.

https://nattothoughts.substack.com/p/who-is-volt-typhoon-a-state-sponsored

Who is Volt Typhoon? A State-sponsored Actor? Or Dark Power?

Cyber attribution is complicated. After all the publicity about Volt Typhoon as a Chinese state hacking group, we have more questions than answers.

Natto Thoughts

APT41 and other Chinese malicious cyber actors can choose from numerous reconnaissance tools developed in China and abroad, including those developed for legitimate defensive purposes.

https://nattothoughts.substack.com/p/apt41s-reconnaissance-techniques

APT41’s Reconnaissance Techniques and Toolkit: Nmap and What Else?

APT41 and other Chinese malicious cyber actors can choose from numerous reconnaissance tools developed in China and abroad, including those developed for legitimate defensive purposes.

Natto Thoughts

Well, no matter whether they use a front company or real business, China’s intelligence services need to get the job done. However, it is still necessary to distinguish the two.

https://nattothoughts.substack.com/p/front-company-or-real-business-in

Front Company or Real Business in China’s Cyber Operations

Distinguishing whether entities are front companies or real businesses can help us understand the strategy, scalability, and persistency of Chinese state-sponsored cyber operations.

Natto Thoughts

Part2a of Natto Thoughts' Ransom-war series - Extortion Entrepreneurs and Their Patriotic Obligations: "Russian cybercriminals have made statements suggesting they see themselves as patriots and warriors for the Russian state against its enemies."

https://nattothoughts.substack.com/p/ransom-war-part-2a-extortion-entrepreneurs

Ransom-War, Part 2a: Extortion Entrepreneurs and Their Patriotic Obligations

Ransomware actors and other cybercriminals are business people first, but they have to do their duty to the Russian motherland

Natto Thoughts