SlideShare a Scribd company logo
1 of 41
Download to read offline
Che Chang Silvia Yeh
From Parroting to Echoing:
The Evolution of
China’s Bots-Driven InfoOps
targeting Taiwan
Che Chang
Senior Cyber Threat Analyst @TeamT5
Research interests
Chinese cybercrime underground market and Information
Operation
Speaking Engagement
Black Hat Asia, HITCON Pacific, Code Blue, SANS CTI
Summit, 2020 vGCTF Workshop and Cybersec in Taiwan.
Silvia Yeh
Cyber Threat Analyst @TeamT5
Research interests
APTs and InfoOps in APAC region
Speaking Engagement
Black Hat Asia, CODE BLUE, SANS CTI Summit, CyberSec, HITCON
Pacific, etc.
Outline
• Intro: China-nexus Bot Networks
• From “Parroting” to “Echoing”
• Case Study: Operation ChinaRoot
• Outlook and Conclusion
Our Methodology
• CTI Mindset
• Actor
• Attribution
• TTPs
• Diamond Model
Intro: China-nexus
Bot Networks
Previous Observation
• Limited influence, no organic engagement
• Mechanical parroting of Chinese state media
• Operations remain persistent for years
• New bots are spawned within a short period of time
• Notable case: Spamouflage network
Mechanical
parroting of
Chinese state
media
- Caption +
meme
- Limited
influence,
no organic
engagement
From “Parroting”
to “Echoing”
Nuanced Changes in TTPs (1):
Hijacking pro-democracy narratives
• Blogs/forums → mainstream social media
platforms
• Create a false appearance that the content is
being echoed across the cyberspace
• Victims
• Milk Tea Alliance
(Online democracy and human rights movement)
• Intrusion Truth
(Anonymous group)
• Safeguard Defenders
(pan-Asian human rights NGO)
Hijacked Identity Trigger Point/Motivation Amplified
Narrative
Date
Milk Tea Alliance Unknown Covid-19 origin conspiracy
theory (Fort Detrick)
2022 FEB – 2022 MAY
Safeguard Defenders Published a report on Chinese
transnational policing
Pro-Chinese police content 2022 SEP – 2022 OCT
Intrusion Truth 1. Intrusion Truth published an
article on APT41
2. Following accusations of NSA’s
attack against Northwestern
Polytechnical University
- APT41 is funded by the U.S.
government
- APT41 is operated by NSA
TAO
2022 JUL - Ongoing
Nuanced Changes in TTPs (1):
Hijacking pro-democracy narratives
kaskus.co.id ID
ameblo.jp JP
vk.com RU
dnyhr.com ASEAN
nanyangmoney.com VN/SG/MY
mhwmm.com MM
xiaoxq.net NAM
careerengine.us NAM
6parkbbs.com NAM
nairaland.com NG
hswh.org.cn CN
teamilk951.tumblr.com
teamilk115.livejournal.com
• Famous “Fort Detrick” conspiracy theory
• Shared infra
• Narrative overlap:
• Taiwan
• Xinjiang
• Journalist
• Lynas Rare Earths
(Operation
DragonBridge)
• Guo Wengui
Shared infra
Nuanced Changes in TTPs (2):
From “Parroting” to “Echoing”
• Local forums → social media platforms → local
forums
• Create a false appearance that the content is
being echoed across the cyberspace
• Online communities of different purposes
(lifestyle, politics, local community, pets,
cryptocurrency, live streaming, marketplace)
Operation ChinaRoot (マツホド)
Operation ChinaRoot (茯苓有點兒甜)
• 茯苓 (マツホド)
• Over 200 fan pages and bot accounts identified
• Botnets overlapped in DRAGONBRIDGE and Spamouflage
• Status: ongoing since mid-2021
• Target: Taiwanese online users
• Aim: Attack Taiwanese pro-independence
politicians
• Platforms: Taiwan’s local forums
• (卡提諾論壇 Ck101, BabyHome, etc.)
Source: Taiwan Ministry of Justice Investigation Bureau (MJIB)
Operation ChinaRoot: Key Narratives
Defeatism
• “PLA is ready to attack Taiwan, Tsai Ing-wen
has escaped,”
Attack pro-democracy U.S. politicians
• “Pelosi’s trip to Taiwan is for financial gain,”
Attack Taiwanese government policies
• “Taiwanese government covered up Covid-
19 death cases,”
• “Taiwan’s Covid measures caused
widespread death among children,”
• “Taiwan’s own Vaccine is causing people
dead.”
Multi-Layer Amplification
①
②
③
④
Narrative
during
Pelosi’s visit
to Taiwan
Narrative during Pelosi’s visit to Taiwan
Outlook
and
Conclusion
Strategic Overview: Overt Operation
• China’s overt operations are always there during every major political
event:
• Hong Kong pro-democracy protest in 2019
• Taiwan’s major elections
• COVID outbreaks
• Ukraine war
• More collaboration between Chinese and Russian state media outlets
and propaganda machine
• China’s propaganda machine was amplifying Russia’s disinformation during
the Ukraine invasion
Strategic Overview: Covert Operation
• Operation ChinaRoot
• Bot networks may be a shared asset among Chinese nation-state
actors
• Bot accounts repeatedly deployed in different influence campaigns
• Guo Wengui, Xinjiang, Hong Kong, US Covid policies, Taiwan, Ukraine
Future Outlook
• Social media platforms: critical battlefields for threat actors to launch
InfoOps
• China’s Overt InfoOp will be more sophisticated.
• China’s Covert InfoOp will be more advanced.
• Political events are the key driver for InfoOp campaigns.
• Mobilization of online netizens
• Doxxing: Create harassment against journalists
• Protest: Incite protests in the physical world
• Strategic Distraction: Breed cynicism, distrust, and defeatism
Future Outlook (cont.)
• We have seen the covert InfoOp in the times of crises.
• Especially in times of war and elections
• People on social media will be targeted and exploited by
authoritarianism government in major political events
• Threat actors react rapidly to current affairs
• Upcoming events
• 2022 Taiwanese local elections
• 2022 U.S. midterm elections
Mitigation
• To mitigate InfoOp on social media needs all stakeholders.
Public Sector
#Cyber Governance
#Law enforcement
#Foreign interference
Civil Society
#Fact Checking
#Media literacy
Global Firms
#Platform Support
#Technical Support
Mitigation (For the Law and Policy Track)
1. Review international and domestic laws
2. Start from human Security
3. Build understanding of technology
4. Maintain the collaborative Mechanisms
*An approach of cyber threat intelligence
CTI approach can provide a better understanding of the threat
landscape by connecting dots, hunting down actors, and swiftly detecting
suspicious accounts during the early stage
• Swift detection of malicious narrative
• Detect and Flag the amplifiers and their botnets
• Immediate removal and blockage before viral
Welcome to visit our booth!
TeamT5は日本人セキュリティアナリスト募集中です。
興味がある方は当社ブースにお立ち寄り下さい。
Thank You.

More Related Content

Similar to [cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh and Che Chang

The language of social media
The language of social mediaThe language of social media
The language of social mediaDiana Maynard
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threatsJapneet Singh
 
We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014evacide
 
Lecture Chinese media
Lecture   Chinese mediaLecture   Chinese media
Lecture Chinese mediaWilfred Wang
 
Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24Cheryll Soriano
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
 
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Dataconomy Media
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Alexia Maddox
 
Stamford innovation week - blockchain day
Stamford innovation week - blockchain dayStamford innovation week - blockchain day
Stamford innovation week - blockchain dayPreston J. Byrne
 
Hack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - introHack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - introhackdemocracy
 
East of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great FirewallEast of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great FirewallMiles Metcalfe
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationCharles Mok
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaREVULN
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsTom Eston
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationCharles Mok
 

Similar to [cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh and Che Chang (20)

The language of social media
The language of social mediaThe language of social media
The language of social media
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014
 
Lecture Chinese media
Lecture   Chinese mediaLecture   Chinese media
Lecture Chinese media
 
Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24
 
Introduction to Hacktivism
Introduction to HacktivismIntroduction to Hacktivism
Introduction to Hacktivism
 
[打造創業生態體系] 02 如何跟上矽谷產品趨勢
[打造創業生態體系] 02 如何跟上矽谷產品趨勢[打造創業生態體系] 02 如何跟上矽谷產品趨勢
[打造創業生態體系] 02 如何跟上矽谷產品趨勢
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
 
Stamford innovation week - blockchain day
Stamford innovation week - blockchain dayStamford innovation week - blockchain day
Stamford innovation week - blockchain day
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Hack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - introHack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - intro
 
East of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great FirewallEast of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great Firewall
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
 
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on TwitterBroker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
 
Presd1 17
Presd1 17Presd1 17
Presd1 17
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo PupilloCODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...CODE BLUE
 
[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 
[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...
 

Recently uploaded

Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCamilleBoulbin1
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 

Recently uploaded (20)

Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 

[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh and Che Chang

  • 1. Che Chang Silvia Yeh From Parroting to Echoing: The Evolution of China’s Bots-Driven InfoOps targeting Taiwan
  • 2. Che Chang Senior Cyber Threat Analyst @TeamT5 Research interests Chinese cybercrime underground market and Information Operation Speaking Engagement Black Hat Asia, HITCON Pacific, Code Blue, SANS CTI Summit, 2020 vGCTF Workshop and Cybersec in Taiwan. Silvia Yeh Cyber Threat Analyst @TeamT5 Research interests APTs and InfoOps in APAC region Speaking Engagement Black Hat Asia, CODE BLUE, SANS CTI Summit, CyberSec, HITCON Pacific, etc.
  • 3. Outline • Intro: China-nexus Bot Networks • From “Parroting” to “Echoing” • Case Study: Operation ChinaRoot • Outlook and Conclusion
  • 4. Our Methodology • CTI Mindset • Actor • Attribution • TTPs • Diamond Model
  • 6. Previous Observation • Limited influence, no organic engagement • Mechanical parroting of Chinese state media • Operations remain persistent for years • New bots are spawned within a short period of time • Notable case: Spamouflage network
  • 8. - Caption + meme - Limited influence, no organic engagement
  • 9.
  • 11. Nuanced Changes in TTPs (1): Hijacking pro-democracy narratives • Blogs/forums → mainstream social media platforms • Create a false appearance that the content is being echoed across the cyberspace • Victims • Milk Tea Alliance (Online democracy and human rights movement) • Intrusion Truth (Anonymous group) • Safeguard Defenders (pan-Asian human rights NGO)
  • 12. Hijacked Identity Trigger Point/Motivation Amplified Narrative Date Milk Tea Alliance Unknown Covid-19 origin conspiracy theory (Fort Detrick) 2022 FEB – 2022 MAY Safeguard Defenders Published a report on Chinese transnational policing Pro-Chinese police content 2022 SEP – 2022 OCT Intrusion Truth 1. Intrusion Truth published an article on APT41 2. Following accusations of NSA’s attack against Northwestern Polytechnical University - APT41 is funded by the U.S. government - APT41 is operated by NSA TAO 2022 JUL - Ongoing Nuanced Changes in TTPs (1): Hijacking pro-democracy narratives
  • 13. kaskus.co.id ID ameblo.jp JP vk.com RU dnyhr.com ASEAN nanyangmoney.com VN/SG/MY mhwmm.com MM xiaoxq.net NAM careerengine.us NAM 6parkbbs.com NAM nairaland.com NG hswh.org.cn CN teamilk951.tumblr.com teamilk115.livejournal.com
  • 14. • Famous “Fort Detrick” conspiracy theory
  • 15.
  • 16. • Shared infra • Narrative overlap: • Taiwan • Xinjiang • Journalist • Lynas Rare Earths (Operation DragonBridge) • Guo Wengui
  • 17.
  • 18.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Nuanced Changes in TTPs (2): From “Parroting” to “Echoing” • Local forums → social media platforms → local forums • Create a false appearance that the content is being echoed across the cyberspace • Online communities of different purposes (lifestyle, politics, local community, pets, cryptocurrency, live streaming, marketplace)
  • 26. Operation ChinaRoot (茯苓有點兒甜) • 茯苓 (マツホド) • Over 200 fan pages and bot accounts identified • Botnets overlapped in DRAGONBRIDGE and Spamouflage • Status: ongoing since mid-2021 • Target: Taiwanese online users • Aim: Attack Taiwanese pro-independence politicians • Platforms: Taiwan’s local forums • (卡提諾論壇 Ck101, BabyHome, etc.) Source: Taiwan Ministry of Justice Investigation Bureau (MJIB)
  • 27. Operation ChinaRoot: Key Narratives Defeatism • “PLA is ready to attack Taiwan, Tsai Ing-wen has escaped,” Attack pro-democracy U.S. politicians • “Pelosi’s trip to Taiwan is for financial gain,” Attack Taiwanese government policies • “Taiwanese government covered up Covid- 19 death cases,” • “Taiwan’s Covid measures caused widespread death among children,” • “Taiwan’s own Vaccine is causing people dead.”
  • 30.
  • 32. Narrative during Pelosi’s visit to Taiwan
  • 34. Strategic Overview: Overt Operation • China’s overt operations are always there during every major political event: • Hong Kong pro-democracy protest in 2019 • Taiwan’s major elections • COVID outbreaks • Ukraine war • More collaboration between Chinese and Russian state media outlets and propaganda machine • China’s propaganda machine was amplifying Russia’s disinformation during the Ukraine invasion
  • 35. Strategic Overview: Covert Operation • Operation ChinaRoot • Bot networks may be a shared asset among Chinese nation-state actors • Bot accounts repeatedly deployed in different influence campaigns • Guo Wengui, Xinjiang, Hong Kong, US Covid policies, Taiwan, Ukraine
  • 36. Future Outlook • Social media platforms: critical battlefields for threat actors to launch InfoOps • China’s Overt InfoOp will be more sophisticated. • China’s Covert InfoOp will be more advanced. • Political events are the key driver for InfoOp campaigns. • Mobilization of online netizens • Doxxing: Create harassment against journalists • Protest: Incite protests in the physical world • Strategic Distraction: Breed cynicism, distrust, and defeatism
  • 37. Future Outlook (cont.) • We have seen the covert InfoOp in the times of crises. • Especially in times of war and elections • People on social media will be targeted and exploited by authoritarianism government in major political events • Threat actors react rapidly to current affairs • Upcoming events • 2022 Taiwanese local elections • 2022 U.S. midterm elections
  • 38.
  • 39. Mitigation • To mitigate InfoOp on social media needs all stakeholders. Public Sector #Cyber Governance #Law enforcement #Foreign interference Civil Society #Fact Checking #Media literacy Global Firms #Platform Support #Technical Support
  • 40. Mitigation (For the Law and Policy Track) 1. Review international and domestic laws 2. Start from human Security 3. Build understanding of technology 4. Maintain the collaborative Mechanisms *An approach of cyber threat intelligence CTI approach can provide a better understanding of the threat landscape by connecting dots, hunting down actors, and swiftly detecting suspicious accounts during the early stage • Swift detection of malicious narrative • Detect and Flag the amplifiers and their botnets • Immediate removal and blockage before viral
  • 41. Welcome to visit our booth! TeamT5は日本人セキュリティアナリスト募集中です。 興味がある方は当社ブースにお立ち寄り下さい。 Thank You.