For the past two decades, when Chinese government employees hacked foreign networks, the process was often the physical world equivalent of a “smash and grab” for sensitive data. It was noisy. Usually, “wake up the neighbors” noisy. The digital artifacts were numerous and readily available when defenders were available to observe. The infrastructure and tools were often reused, leaving the same digital fingerprints on every virtual surface.
Cyber Silk Road: Tracing China’s Stealth Turn
Cyber Silk Road: Tracing China’s Stealth Turn
Cyber Silk Road: Tracing China’s Stealth Turn
For the past two decades, when Chinese government employees hacked foreign networks, the process was often the physical world equivalent of a “smash and grab” for sensitive data. It was noisy. Usually, “wake up the neighbors” noisy. The digital artifacts were numerous and readily available when defenders were available to observe. The infrastructure and tools were often reused, leaving the same digital fingerprints on every virtual surface.