Winnona 💾 Profile picture
Feb 29 14 tweets 4 min read Read on X
🚨NEW - iSoon & the Chinese cyber mercenary ecosystem 🚨
Going back to my roots with some good old fashioned China cyber analysis @Margin_Research. How is iSoon related to cyber mercenaries, and the Chinese offensive ecosystem? 🧵/ 5 findings:
margin.re/2024/02/same-s…
1️⃣ Tianfu Cup confirmed to be exploit feeder system for the Chinese Ministry of Public Security (MPS). If the stuff isn’t fullchain ⛓️(ready to use), the MPS disseminates the proof-of-concept code to private firms to further exploit. Image
This is absolutely the precursor to the wider CN vulnerability disclosure laws - tagging great reporting by @DakotaInDC @kristindelrosso atlanticcouncil.org/in-depth-resea…
@ anyone interested in curbing proliferation of these capabilities, look at the last line of the chat 💀 Image
Also confirmation of @HowellONeill’s great reporting here: technologyreview.com/2021/05/06/102…
2️⃣ Qihoo360 invests in cyber mercenaries and may have even sold user PII? 360 is a series A investor in iSoon AND chatlogs suggest iSoon is being sold 360 PII… 😱 that’s the equivalent of Symantec selling data to Palantir… Image
3️⃣ this is a well-funded, prime/sub-contracting ecosystem, like NSO/Intellexa.
🇨🇳 offensive capabilities firms are large, sometimes venture-backed firms in a dense ecosystem of players. Some firms directly bid for contracts, some work with large primes, and some join forces.
4️⃣ NoSugarTech, for example- a Chinese VR shop is selling QQ exploits to iSoon for 100k a pop 👀 Image
5️⃣ ofc, CN firms have a well established Capture-the-Flag (CTF) to hiring pipeline for offensive talent: something many people who play CTF have known for years. ctftime.org/stats/2021/CN
Why should you care?
Yes, NSO is well known but this is a global market for capabilities, and China is key player. Prior to this leak, little has been made public about the Chinese offensive cyber capability marketplace!
What can we do? 1) use these leaks against China’s diplomatic efforts. It’s bad form for them to be relying on companies like these and to hoard vulns/create “buggy banks” - (term stolen from @k8em0 she deserves all credit).
Also, follow the people! Plenty of actors in this leak are known entities - and when they close shop in one place they go to another. I mention this in my
Lawfare piece here: lawfaremedia.org/article/export…
Suing companies is also a great option. Yes, US courts may not have jurisdiction if they don’t have a branch here, but you might get it in the UK or elsewhere!
Anyway okay, I’ve been pulling too many all nighters this week to get this out, mostly to show to myself I’ve still got my China analysis chops while in law school. Time for a well deserved nap 👋

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Winnona 💾

Winnona 💾 Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @__winn

Oct 4, 2022
@TheOnion just submitted a brief to the Supreme Court on a First Amendment Case about parody on social media, and it is the best thing I have ever read. Buckle up: 🧵/
1: Why is this case so important?
Novak made a parody Facebook page of his local Ohio police department. The page was up for 12 hours: the police investigated the page, arrested him, and seized his computer. 😡
acluohio.org/en/cases/novak…
After the charges were dropped, Novak sued the police department. The 6th circuit has claimed that he should have had a *disclaimer* for his parody site, and that he can't sue the police due to qualified immunity.
Enter @TheOnion's brief, equal parts scathing & incredible: 🧅🧅
Read 10 tweets
Apr 6, 2022
🚨Linux Kernel Security Blog🚨
Corporate, automated bug-finders in the #linux kernel- how much do we know about them?

@daveaitel @ian_roos and I look @ closed source, corporate interests in the world’s biggest open source project. THREAD 🧵
margin.re/media/watching…
@lwnnet’s 5.12 development statistics caught our attention at @Margin_Research: 5 of the top 10 bug reporters (presumably for bugs that got fixed) were automated systems!
@lwnnet @Margin_Research We examine 6 of the top automated contributors and ask the following:
1️⃣ What company owns the tool?
2️⃣ How many people use the tool?
3️⃣ How many NON-corporate employees use it?
4️⃣ Is the tool open sourced?
5️⃣ How many patches are attributed to the tool?

A handy table:
Read 13 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(