Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

10/11/2018
09:35 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

Russian & Chinese Hacking Forums Have Distinct Characteristics

A year-long deep dive by Recorded Future finds that Russian and Chinese hacking forums differ in many respects.

It's thieves versus geeks on Russian and Chinese hacking forums.

While some current security discussions tie various hacking groups together without distinction, a year-long, deep-dive investigation by real-time threat intelligence vendor Recorded Future finds that Russian and Chinese hacking forums have unique characteristics with varying motives among the two different groups.

The October 10 report, "Thieves and Geeks: Russian and Chinese Hacking Communities," examined the advertisements, posts and interactions within these various hacking and criminal forums in order to create a much richer picture of the two cultures.

The idea behind the report is to go beyond what is bought and sold on these forums to understand some of the motives behind the people who participate. The results are that Russian and Chinese hackers are miles apart in what they do and how they do it.

"Each country's hackers are unique, with their own codes of conduct, forums, motives, and payment methods," the study finds.

The biggest difference is how Russian and Chinese forums view what they do on these forums. For Russians, the forums are places of business and deals are based on reputation, and interactions remain almost professional.

"Russian forums leave very little room for socializing or camaraderie," according to the report. "These sites are places of business, not bastions for community. Respect and trust are built on successful financial transactions, and the reliable, consistent forum members rise to the top of their trade, while those with lesser consistency are given poor ratings."

Those hackers with poor ratings, called "kidala" or "ripper," are typically banned or blacklisted.

The Chinese forums are the complete opposite. There is a great of comradery and interaction between different individuals and groups. "Many of these forums require members to engage with a post, either through a comment or personal message, before being able to purchase or trade malware. Daily interaction on a forum can also be a prerequisite for maintaining forum membership or a way to generate in-forum currency," according to the report.

Some of this culture reflects the "Great Firewall of China," which limits how much information and content can filter into the country. The Chinese forums have less freedom than their Russian counterparts, and the forums and what they sell and promote on them reflect that reality.

In both cases, Russian and Chinese forums are organized in open, semi-private and closed sites, with varying levels of access depending on the administrator. Many of the open forums are available on the standard Clearnet, as opposed to the Tor-accessed Dark Web. (See Watch Out: The Dark Web Is Really Watching You.)

One interesting note on the Russian forum is an unspoken rule that hackers will attack targets outside of the Russian Federation. Testing within Russia is allowed, but malware attacks must target victims outside the country, or hackers risk arrest.

For the most part, Russian forums offer a wide variety of tools, including ransomware, loaders, trojans, exploit kits, installs, spam bots, web traffic, forged documents, money mules, bank accounts and credit cards.

The report also found that while Russian forums attract Russian, English and Chinese speakers, most of the Chinese forums are more closed because of the language barrier, with Russian and English speakers turning their attention elsewhere.

With the Chinese forums, Distributed Denial of Service (DDoS) tools and remote access Trojans are the most popular. In addition, these forums tend to sell and distribute various VPNs in order to bypass the country's censors.

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cloud Security Threats for 2021
Or Azarzar, CTO & Co-Founder of Lightspin,  12/3/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Assessing Cybersecurity Risk in Todays Enterprises
Assessing Cybersecurity Risk in Todays Enterprises
COVID-19 has created a new IT paradigm in the enterprise and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27772
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could po...
CVE-2020-27773
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to appli...
CVE-2020-28950
PUBLISHED: 2020-12-04
The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.
CVE-2020-27774
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but co...
CVE-2020-27775
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but c...