Tech and AI2 Men Linked to China’s Salt Typhoon Hacker Group...

2 Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’

-


To try to determine the probability of those name repetitions being a coincidence, Cary checked two databases of Chinese names and consulted with Yi Fuxian, a professor of Chinese demography at the University of Wisconsin–Madison. The name Qiu Daibing—or 邱代兵 in Chinese characters—turned out to be a relatively unlikely name to show up twice just by chance, he says. The surname 邱 alone, Yi confirmed to WIRED, represents just 0.27 percent of Chinese names, and in combination with the specific 代兵 given name would represent a far smaller percentage.

The name Yu Yang (余洋 in Chinese characters) is more common. But the two names appearing in association seems less likely to be a coincidence, Cary theorizes. “The sheer improbability of somebody having this name also being paired with a Yu Yang, having this skill set and going to the same university in the same location where these companies are registered, it’s just an incredibly small chance that these are not the right people,” Cary argues.

WIRED attempted to contact Qiu Daibing and Yu Yang via both Qiu Daibing’s LinkedIn page and an email address on the website of Beijing Huanyu Tianqiong but received no response.

If Cary’s theory that two men linked to Salt Typhoon were in fact trained in Cisco’s Networking Academy is correct, it doesn’t represent a flaw or security oversight in Cisco’s program, he says. Instead, it points to a tough-to-avoid issue in a globalized market where technology products—and even training in the technical details of those products—are widely available, including to potential hacking adversaries.

Cary argues that the issue has only become more glaring, however, as China has tried for years to replace Cisco equipment and other Western devices in its own networks with domestic alternatives. “If China is moving in the direction of actually removing these products from Chinese networks,” Cary asks, “who’s still interested in learning about them?”

China has, meanwhile, increasingly restricted its own information-sharing with the global cybersecurity community, points out John Hultquist, chief analyst at Google’s Threat Intelligence Group, for instance, by pressuring security researchers not to present findings at international conferences.

“It’s like we’re in a sharing group, and they’ve told us straight to our face that they’re not going to reciprocate,” Hultquist says. “We’re benefiting them with our programs. But it’s not going in the other direction.”



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest news

What Is a Web3 Wallet? The Complete Guide for Beginners

What is a Web3 wallet? It’s one of the first questions people ask when they begin exploring cryptocurrencies,...

Aave developer BDG Labs to ‘cease contribution’ after DAO drama

The latest in a string of Aave DAO disputes sees BGD Labs quit, citing Aave Labs’ behavior around...

Google’s Personal Intelligence feature is expanding to all US users

Google announced on Tuesday that it’s expanding Personal Intelligence, its feature that allows its AI assistant to tailor...

Advertisement

CFTC No-Action Relief Unlocks Crypto Wallet Access to Regulated Derivatives Markets

CFTC clears a path for crypto wallet software to expand into derivatives access without broker registration, signaling a...

What is SIREN Crypto? SIREN Price Tops Gainers in 22% Pump – Next Stop $1?

SIREN crypto has emerged as a standout performer in a choppy market, surging above the $0.70 level while...

Must read

You might also likeRELATED
Recommended to you