SlideShare a Scribd company logo
Che Chang Silvia Yeh
From Parroting to Echoing:
The Evolution of
China’s Bots-Driven InfoOps
targeting Taiwan
Che Chang
Senior Cyber Threat Analyst @TeamT5
Research interests
Chinese cybercrime underground market and Information
Operation
Speaking Engagement
Black Hat Asia, HITCON Pacific, Code Blue, SANS CTI
Summit, 2020 vGCTF Workshop and Cybersec in Taiwan.
Silvia Yeh
Cyber Threat Analyst @TeamT5
Research interests
APTs and InfoOps in APAC region
Speaking Engagement
Black Hat Asia, CODE BLUE, SANS CTI Summit, CyberSec, HITCON
Pacific, etc.
Outline
• Intro: China-nexus Bot Networks
• From “Parroting” to “Echoing”
• Case Study: Operation ChinaRoot
• Outlook and Conclusion
Our Methodology
• CTI Mindset
• Actor
• Attribution
• TTPs
• Diamond Model
Intro: China-nexus
Bot Networks
Previous Observation
• Limited influence, no organic engagement
• Mechanical parroting of Chinese state media
• Operations remain persistent for years
• New bots are spawned within a short period of time
• Notable case: Spamouflage network
Mechanical
parroting of
Chinese state
media
- Caption +
meme
- Limited
influence,
no organic
engagement
From “Parroting”
to “Echoing”
Nuanced Changes in TTPs (1):
Hijacking pro-democracy narratives
• Blogs/forums → mainstream social media
platforms
• Create a false appearance that the content is
being echoed across the cyberspace
• Victims
• Milk Tea Alliance
(Online democracy and human rights movement)
• Intrusion Truth
(Anonymous group)
• Safeguard Defenders
(pan-Asian human rights NGO)
Hijacked Identity Trigger Point/Motivation Amplified
Narrative
Date
Milk Tea Alliance Unknown Covid-19 origin conspiracy
theory (Fort Detrick)
2022 FEB – 2022 MAY
Safeguard Defenders Published a report on Chinese
transnational policing
Pro-Chinese police content 2022 SEP – 2022 OCT
Intrusion Truth 1. Intrusion Truth published an
article on APT41
2. Following accusations of NSA’s
attack against Northwestern
Polytechnical University
- APT41 is funded by the U.S.
government
- APT41 is operated by NSA
TAO
2022 JUL - Ongoing
Nuanced Changes in TTPs (1):
Hijacking pro-democracy narratives
kaskus.co.id ID
ameblo.jp JP
vk.com RU
dnyhr.com ASEAN
nanyangmoney.com VN/SG/MY
mhwmm.com MM
xiaoxq.net NAM
careerengine.us NAM
6parkbbs.com NAM
nairaland.com NG
hswh.org.cn CN
teamilk951.tumblr.com
teamilk115.livejournal.com
• Famous “Fort Detrick” conspiracy theory
• Shared infra
• Narrative overlap:
• Taiwan
• Xinjiang
• Journalist
• Lynas Rare Earths
(Operation
DragonBridge)
• Guo Wengui
Shared infra
Nuanced Changes in TTPs (2):
From “Parroting” to “Echoing”
• Local forums → social media platforms → local
forums
• Create a false appearance that the content is
being echoed across the cyberspace
• Online communities of different purposes
(lifestyle, politics, local community, pets,
cryptocurrency, live streaming, marketplace)
Operation ChinaRoot (マツホド)
Operation ChinaRoot (茯苓有點兒甜)
• 茯苓 (マツホド)
• Over 200 fan pages and bot accounts identified
• Botnets overlapped in DRAGONBRIDGE and Spamouflage
• Status: ongoing since mid-2021
• Target: Taiwanese online users
• Aim: Attack Taiwanese pro-independence
politicians
• Platforms: Taiwan’s local forums
• (卡提諾論壇 Ck101, BabyHome, etc.)
Source: Taiwan Ministry of Justice Investigation Bureau (MJIB)
Operation ChinaRoot: Key Narratives
Defeatism
• “PLA is ready to attack Taiwan, Tsai Ing-wen
has escaped,”
Attack pro-democracy U.S. politicians
• “Pelosi’s trip to Taiwan is for financial gain,”
Attack Taiwanese government policies
• “Taiwanese government covered up Covid-
19 death cases,”
• “Taiwan’s Covid measures caused
widespread death among children,”
• “Taiwan’s own Vaccine is causing people
dead.”
Multi-Layer Amplification
①
②
③
④
Narrative
during
Pelosi’s visit
to Taiwan
Narrative during Pelosi’s visit to Taiwan
Outlook
and
Conclusion
Strategic Overview: Overt Operation
• China’s overt operations are always there during every major political
event:
• Hong Kong pro-democracy protest in 2019
• Taiwan’s major elections
• COVID outbreaks
• Ukraine war
• More collaboration between Chinese and Russian state media outlets
and propaganda machine
• China’s propaganda machine was amplifying Russia’s disinformation during
the Ukraine invasion
Strategic Overview: Covert Operation
• Operation ChinaRoot
• Bot networks may be a shared asset among Chinese nation-state
actors
• Bot accounts repeatedly deployed in different influence campaigns
• Guo Wengui, Xinjiang, Hong Kong, US Covid policies, Taiwan, Ukraine
Future Outlook
• Social media platforms: critical battlefields for threat actors to launch
InfoOps
• China’s Overt InfoOp will be more sophisticated.
• China’s Covert InfoOp will be more advanced.
• Political events are the key driver for InfoOp campaigns.
• Mobilization of online netizens
• Doxxing: Create harassment against journalists
• Protest: Incite protests in the physical world
• Strategic Distraction: Breed cynicism, distrust, and defeatism
Future Outlook (cont.)
• We have seen the covert InfoOp in the times of crises.
• Especially in times of war and elections
• People on social media will be targeted and exploited by
authoritarianism government in major political events
• Threat actors react rapidly to current affairs
• Upcoming events
• 2022 Taiwanese local elections
• 2022 U.S. midterm elections
Mitigation
• To mitigate InfoOp on social media needs all stakeholders.
Public Sector
#Cyber Governance
#Law enforcement
#Foreign interference
Civil Society
#Fact Checking
#Media literacy
Global Firms
#Platform Support
#Technical Support
Mitigation (For the Law and Policy Track)
1. Review international and domestic laws
2. Start from human Security
3. Build understanding of technology
4. Maintain the collaborative Mechanisms
*An approach of cyber threat intelligence
CTI approach can provide a better understanding of the threat
landscape by connecting dots, hunting down actors, and swiftly detecting
suspicious accounts during the early stage
• Swift detection of malicious narrative
• Detect and Flag the amplifiers and their botnets
• Immediate removal and blockage before viral
Welcome to visit our booth!
TeamT5は日本人セキュリティアナリスト募集中です。
興味がある方は当社ブースにお立ち寄り下さい。
Thank You.

More Related Content

Similar to [cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh and Che Chang

We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014
evacide
 
Lecture Chinese media
Lecture   Chinese mediaLecture   Chinese media
Lecture Chinese media
Wilfred Wang
 
Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24
Cheryll Soriano
 
Introduction to Hacktivism
Introduction to HacktivismIntroduction to Hacktivism
Introduction to Hacktivism
Phil Huggins FBCS CITP
 
[打造創業生態體系] 02 如何跟上矽谷產品趨勢
[打造創業生態體系] 02 如何跟上矽谷產品趨勢[打造創業生態體系] 02 如何跟上矽谷產品趨勢
[打造創業生態體系] 02 如何跟上矽谷產品趨勢
National Development Council, Taiwan
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
Andrew Krzmarzick
 
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Dataconomy Media
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Alexia Maddox
 
Stamford innovation week - blockchain day
Stamford innovation week - blockchain dayStamford innovation week - blockchain day
Stamford innovation week - blockchain day
Preston J. Byrne
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
n|u - The Open Security Community
 
Hack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - introHack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - intro
hackdemocracy
 
East of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great FirewallEast of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great Firewall
Miles Metcalfe
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Charles Mok
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
REVULN
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Tom Eston
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
Charles Mok
 
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on TwitterBroker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Cybersecurity Education and Research Centre
 
IT Quiz MES
IT Quiz MESIT Quiz MES
IT Quiz MES
Shyju Chathampalli
 
ICT4Peace: Beyond the hype
ICT4Peace: Beyond the hypeICT4Peace: Beyond the hype
ICT4Peace: Beyond the hype
Sanjana Hattotuwa
 

Similar to [cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh and Che Chang (20)

We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014
 
Lecture Chinese media
Lecture   Chinese mediaLecture   Chinese media
Lecture Chinese media
 
Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24
 
Introduction to Hacktivism
Introduction to HacktivismIntroduction to Hacktivism
Introduction to Hacktivism
 
[打造創業生態體系] 02 如何跟上矽谷產品趨勢
[打造創業生態體系] 02 如何跟上矽谷產品趨勢[打造創業生態體系] 02 如何跟上矽谷產品趨勢
[打造創業生態體系] 02 如何跟上矽谷產品趨勢
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
 
Stamford innovation week - blockchain day
Stamford innovation week - blockchain dayStamford innovation week - blockchain day
Stamford innovation week - blockchain day
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Hack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - introHack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - intro
 
East of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great FirewallEast of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great Firewall
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
 
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on TwitterBroker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
 
Presd1 17
Presd1 17Presd1 17
Presd1 17
 
IT Quiz MES
IT Quiz MESIT Quiz MES
IT Quiz MES
 
ICT4Peace: Beyond the hype
ICT4Peace: Beyond the hypeICT4Peace: Beyond the hype
ICT4Peace: Beyond the hype
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
CODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
CODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
CODE BLUE
 
[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...
CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 
[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...
 

Recently uploaded

Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 

Recently uploaded (13)

Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 

[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh and Che Chang

  • 1. Che Chang Silvia Yeh From Parroting to Echoing: The Evolution of China’s Bots-Driven InfoOps targeting Taiwan
  • 2. Che Chang Senior Cyber Threat Analyst @TeamT5 Research interests Chinese cybercrime underground market and Information Operation Speaking Engagement Black Hat Asia, HITCON Pacific, Code Blue, SANS CTI Summit, 2020 vGCTF Workshop and Cybersec in Taiwan. Silvia Yeh Cyber Threat Analyst @TeamT5 Research interests APTs and InfoOps in APAC region Speaking Engagement Black Hat Asia, CODE BLUE, SANS CTI Summit, CyberSec, HITCON Pacific, etc.
  • 3. Outline • Intro: China-nexus Bot Networks • From “Parroting” to “Echoing” • Case Study: Operation ChinaRoot • Outlook and Conclusion
  • 4. Our Methodology • CTI Mindset • Actor • Attribution • TTPs • Diamond Model
  • 6. Previous Observation • Limited influence, no organic engagement • Mechanical parroting of Chinese state media • Operations remain persistent for years • New bots are spawned within a short period of time • Notable case: Spamouflage network
  • 8. - Caption + meme - Limited influence, no organic engagement
  • 9.
  • 11. Nuanced Changes in TTPs (1): Hijacking pro-democracy narratives • Blogs/forums → mainstream social media platforms • Create a false appearance that the content is being echoed across the cyberspace • Victims • Milk Tea Alliance (Online democracy and human rights movement) • Intrusion Truth (Anonymous group) • Safeguard Defenders (pan-Asian human rights NGO)
  • 12. Hijacked Identity Trigger Point/Motivation Amplified Narrative Date Milk Tea Alliance Unknown Covid-19 origin conspiracy theory (Fort Detrick) 2022 FEB – 2022 MAY Safeguard Defenders Published a report on Chinese transnational policing Pro-Chinese police content 2022 SEP – 2022 OCT Intrusion Truth 1. Intrusion Truth published an article on APT41 2. Following accusations of NSA’s attack against Northwestern Polytechnical University - APT41 is funded by the U.S. government - APT41 is operated by NSA TAO 2022 JUL - Ongoing Nuanced Changes in TTPs (1): Hijacking pro-democracy narratives
  • 13. kaskus.co.id ID ameblo.jp JP vk.com RU dnyhr.com ASEAN nanyangmoney.com VN/SG/MY mhwmm.com MM xiaoxq.net NAM careerengine.us NAM 6parkbbs.com NAM nairaland.com NG hswh.org.cn CN teamilk951.tumblr.com teamilk115.livejournal.com
  • 14. • Famous “Fort Detrick” conspiracy theory
  • 15.
  • 16. • Shared infra • Narrative overlap: • Taiwan • Xinjiang • Journalist • Lynas Rare Earths (Operation DragonBridge) • Guo Wengui
  • 17.
  • 18.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Nuanced Changes in TTPs (2): From “Parroting” to “Echoing” • Local forums → social media platforms → local forums • Create a false appearance that the content is being echoed across the cyberspace • Online communities of different purposes (lifestyle, politics, local community, pets, cryptocurrency, live streaming, marketplace)
  • 26. Operation ChinaRoot (茯苓有點兒甜) • 茯苓 (マツホド) • Over 200 fan pages and bot accounts identified • Botnets overlapped in DRAGONBRIDGE and Spamouflage • Status: ongoing since mid-2021 • Target: Taiwanese online users • Aim: Attack Taiwanese pro-independence politicians • Platforms: Taiwan’s local forums • (卡提諾論壇 Ck101, BabyHome, etc.) Source: Taiwan Ministry of Justice Investigation Bureau (MJIB)
  • 27. Operation ChinaRoot: Key Narratives Defeatism • “PLA is ready to attack Taiwan, Tsai Ing-wen has escaped,” Attack pro-democracy U.S. politicians • “Pelosi’s trip to Taiwan is for financial gain,” Attack Taiwanese government policies • “Taiwanese government covered up Covid- 19 death cases,” • “Taiwan’s Covid measures caused widespread death among children,” • “Taiwan’s own Vaccine is causing people dead.”
  • 30.
  • 32. Narrative during Pelosi’s visit to Taiwan
  • 34. Strategic Overview: Overt Operation • China’s overt operations are always there during every major political event: • Hong Kong pro-democracy protest in 2019 • Taiwan’s major elections • COVID outbreaks • Ukraine war • More collaboration between Chinese and Russian state media outlets and propaganda machine • China’s propaganda machine was amplifying Russia’s disinformation during the Ukraine invasion
  • 35. Strategic Overview: Covert Operation • Operation ChinaRoot • Bot networks may be a shared asset among Chinese nation-state actors • Bot accounts repeatedly deployed in different influence campaigns • Guo Wengui, Xinjiang, Hong Kong, US Covid policies, Taiwan, Ukraine
  • 36. Future Outlook • Social media platforms: critical battlefields for threat actors to launch InfoOps • China’s Overt InfoOp will be more sophisticated. • China’s Covert InfoOp will be more advanced. • Political events are the key driver for InfoOp campaigns. • Mobilization of online netizens • Doxxing: Create harassment against journalists • Protest: Incite protests in the physical world • Strategic Distraction: Breed cynicism, distrust, and defeatism
  • 37. Future Outlook (cont.) • We have seen the covert InfoOp in the times of crises. • Especially in times of war and elections • People on social media will be targeted and exploited by authoritarianism government in major political events • Threat actors react rapidly to current affairs • Upcoming events • 2022 Taiwanese local elections • 2022 U.S. midterm elections
  • 38.
  • 39. Mitigation • To mitigate InfoOp on social media needs all stakeholders. Public Sector #Cyber Governance #Law enforcement #Foreign interference Civil Society #Fact Checking #Media literacy Global Firms #Platform Support #Technical Support
  • 40. Mitigation (For the Law and Policy Track) 1. Review international and domestic laws 2. Start from human Security 3. Build understanding of technology 4. Maintain the collaborative Mechanisms *An approach of cyber threat intelligence CTI approach can provide a better understanding of the threat landscape by connecting dots, hunting down actors, and swiftly detecting suspicious accounts during the early stage • Swift detection of malicious narrative • Detect and Flag the amplifiers and their botnets • Immediate removal and blockage before viral
  • 41. Welcome to visit our booth! TeamT5は日本人セキュリティアナリスト募集中です。 興味がある方は当社ブースにお立ち寄り下さい。 Thank You.