Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

10/11/2018
09:35 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

Russian & Chinese Hacking Forums Have Distinct Characteristics

A year-long deep dive by Recorded Future finds that Russian and Chinese hacking forums differ in many respects.

It's thieves versus geeks on Russian and Chinese hacking forums.

While some current security discussions tie various hacking groups together without distinction, a year-long, deep-dive investigation by real-time threat intelligence vendor Recorded Future finds that Russian and Chinese hacking forums have unique characteristics with varying motives among the two different groups.

The October 10 report, "Thieves and Geeks: Russian and Chinese Hacking Communities," examined the advertisements, posts and interactions within these various hacking and criminal forums in order to create a much richer picture of the two cultures.

The idea behind the report is to go beyond what is bought and sold on these forums to understand some of the motives behind the people who participate. The results are that Russian and Chinese hackers are miles apart in what they do and how they do it.

"Each country's hackers are unique, with their own codes of conduct, forums, motives, and payment methods," the study finds.

The biggest difference is how Russian and Chinese forums view what they do on these forums. For Russians, the forums are places of business and deals are based on reputation, and interactions remain almost professional.

"Russian forums leave very little room for socializing or camaraderie," according to the report. "These sites are places of business, not bastions for community. Respect and trust are built on successful financial transactions, and the reliable, consistent forum members rise to the top of their trade, while those with lesser consistency are given poor ratings."

Those hackers with poor ratings, called "kidala" or "ripper," are typically banned or blacklisted.

The Chinese forums are the complete opposite. There is a great of comradery and interaction between different individuals and groups. "Many of these forums require members to engage with a post, either through a comment or personal message, before being able to purchase or trade malware. Daily interaction on a forum can also be a prerequisite for maintaining forum membership or a way to generate in-forum currency," according to the report.

Some of this culture reflects the "Great Firewall of China," which limits how much information and content can filter into the country. The Chinese forums have less freedom than their Russian counterparts, and the forums and what they sell and promote on them reflect that reality.

In both cases, Russian and Chinese forums are organized in open, semi-private and closed sites, with varying levels of access depending on the administrator. Many of the open forums are available on the standard Clearnet, as opposed to the Tor-accessed Dark Web. (See Watch Out: The Dark Web Is Really Watching You.)

One interesting note on the Russian forum is an unspoken rule that hackers will attack targets outside of the Russian Federation. Testing within Russia is allowed, but malware attacks must target victims outside the country, or hackers risk arrest.

For the most part, Russian forums offer a wide variety of tools, including ransomware, loaders, trojans, exploit kits, installs, spam bots, web traffic, forged documents, money mules, bank accounts and credit cards.

The report also found that while Russian forums attract Russian, English and Chinese speakers, most of the Chinese forums are more closed because of the language barrier, with Russian and English speakers turning their attention elsewhere.

With the Chinese forums, Distributed Denial of Service (DDoS) tools and remote access Trojans are the most popular. In addition, these forums tend to sell and distribute various VPNs in order to bypass the country's censors.

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15208
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can ...
CVE-2020-15209
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one....
CVE-2020-15210
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and ...
CVE-2020-15211
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices f...
CVE-2020-15212
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `outpu...