<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Natto Thoughts: Private Industry & Tools]]></title><description><![CDATA[This section examines how China's commercial cybersecurity sector develops and sustains offensive capability – through attack-defense labs, vulnerability research, scanning tooling, and participation in trusted vendor programs that provide access to sensitive security information.]]></description><link>https://www.nattothoughts.com/s/offensive-industry-and-tools</link><image><url>https://substackcdn.com/image/fetch/$s_!t3eQ!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png</url><title>Natto Thoughts: Private Industry &amp; Tools</title><link>https://www.nattothoughts.com/s/offensive-industry-and-tools</link></image><generator>Substack</generator><lastBuildDate>Wed, 20 May 2026 04:29:26 GMT</lastBuildDate><atom:link href="https://www.nattothoughts.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Natto Thoughts]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[nattothoughts@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[nattothoughts@substack.com]]></itunes:email><itunes:name><![CDATA[Natto Team]]></itunes:name></itunes:owner><itunes:author><![CDATA[Natto Team]]></itunes:author><googleplay:owner><![CDATA[nattothoughts@substack.com]]></googleplay:owner><googleplay:email><![CDATA[nattothoughts@substack.com]]></googleplay:email><googleplay:author><![CDATA[Natto Team]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[China’s 2025 Top 20 Cybersecurity Companies: Which “Dark Horses” Will Emerge to Prominence in 2026? ]]></title><description><![CDATA[Annual ranking reveals hyper-competitive, innovation-focused top performers &#8211; some familiar and some not so well known, with extensive government ties]]></description><link>https://www.nattothoughts.com/p/chinas-2025-top-20-cybersecurity</link><guid isPermaLink="false">https://www.nattothoughts.com/p/chinas-2025-top-20-cybersecurity</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 14 Jan 2026 15:03:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RwhR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b597dc-7c82-41bd-9db6-ab262a67d0c7_623x849.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As we enter 2026, the geopolitical landscape appears more uncertain than ever. Ongoing conflicts, such as the Russia-Ukraine war, remain unresolved, while <a href="https://www.aei.org/articles/bracing-for-china-shock-2-0/">competition</a> among major world powers is intensifying. In such a climate, strength and capability are paramount. China&#8217;s cybersecurity industry <a href="https://web.archive.org/web/20251007173305/https:/www.ciids.cn/list_15/5033.html">recognizes</a> its special expertise as &#8220;the fundamental cornerstone for safeguarding national security.&#8221; Among the more than five thousand cybersecurity companies in China, which ones stand out as top providers of quality products and services, significantly contributing to China&#8217;s national security? The &#8220;2025 Top 20 Chinese Cybersecurity Enterprises (2025&#24180;&#20013;&#22269;&#32593;&#32476;&#23433;&#20840;&#21069;&#20108;&#21313;&#23478;&#20225;&#19994;)&#8221; list featured in the annual &#8220;China Internet Company Comprehensive Capability Index (CICCI) (&#20013;&#22269;&#20114;&#32852;&#32593;&#20225;&#19994;&#32508;&#21512;&#23454;&#21147;&#25351;&#25968;)&#8221; <a href="https://web.archive.org/web/20260108023343/https:/www.isc.org.cn/article/27470949623525376.html">report</a> published at the end of December 2025 by the <a href="https://web.archive.org/web/20250211023130/https:/www.isc.org.cn/article/15315.html">Internet Society of China</a> (ISC)&#8212;an industry association affiliated with the Chinese Ministry of Industry and Information Technology (MIIT)&#8212;offers a fresh perspective on the leading players in China&#8217;s cybersecurity industry as we begin our 2026 research focused on this sector.</p><p>The Natto Team believes that understanding these Chinese cybersecurity companies is essential for grasping how China develops its cyber capabilities. Since launching Natto Thoughts in 2023, our team has investigated several Chinese cybersecurity companies involved in state-sponsored or state-linked cyber operations. Our <a href="https://nattothoughts.substack.com/p/a-look-back-at-the-top-5-natto-thoughts">findings</a> suggest that China has established a highly effective and state-aligned system, notably integrating the private sector&#8212;Chinese cybersecurity companies&#8212;in building its cyber capabilities.</p><p>In this post, the Natto Team examines the overall development of China&#8217;s cybersecurity sector and the top cybersecurity companies of 2025 based on the ISC&#8217;s CICCI reports, which analyze these companies&#8217; key performance indicators, innovation and research and development (R&amp;D) capabilities, business and market coverage, and how their core functions align with China&#8217;s national priorities.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.nattothoughts.com/subscribe?"><span>Subscribe now</span></a></p>
      <p>
          <a href="https://www.nattothoughts.com/p/chinas-2025-top-20-cybersecurity">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Knownsec: The King of Vulnerability Missed Three Vulnerabilities of Its Own]]></title><description><![CDATA[The leak incident involving Chinese cybersecurity firm Knownsec shows the company&#8217;s seemingly transparent crisis management strategy and underscores its position in the industry, but mysteries remain.]]></description><link>https://www.nattothoughts.com/p/knownsec-the-king-of-vulnerability</link><guid isPermaLink="false">https://www.nattothoughts.com/p/knownsec-the-king-of-vulnerability</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 03 Dec 2025 17:02:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aJNH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3a758e8-4f22-496d-a243-f6ae1908801d_535x710.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On November 5, 2025, a Chinese-language blog called <a href="https://archive.li/NNsWb#selection-347.3-347.169">Mrxn&#8217;s Blog</a> published a &#8220;massive&#8221; leak of information from Knownsec (&#30693;&#36947;&#21019;&#23431;), a Chinese cybersecurity company. Mrxn claimed that the leak included 12,000 confidential documents, such as &#8220;China&#8217;s state-level cyber weapons, internal tool systems, and global target lists.&#8221; The blog provided sample screenshots of the leak and noted that the leaked information first appeared on the code-sharing platform GitHub, which subsequently removed it &#8220;for violating its terms of service.&#8221; The <a href="https://netaskari.substack.com/p/knownsec-breach-what-we-know-so-far">NETASKARI</a> Substack was among the first outlets to report in English on Mrxn&#8217;s blog post about the leak. <a href="https://netaskari.substack.com/p/knownsec-breach-what-we-know-so-far">NETASKARI</a>&#8217;s author, a freelance journalist based in Amsterdam, The Netherlands, provided a summary and analysis of the limited available leaked documents&#8212;including screenshots of product brochures, data collection lists, and a Knownsec company profile&#8212;and concluded there was no &#8220;smoking gun&#8221; or evidence of state-of-the-art tools used by Chinese state hackers. H&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/knownsec-the-king-of-vulnerability">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[China’s Cybersecurity Companies Advancing Offensive Cyber Capabilities Through Attack-Defense Labs ]]></title><description><![CDATA[Private-sector attack-defense labs form a core pillar of how China builds, sustains, and operationalizes cyber capability for commercial purposes and state-linked cyber operations.]]></description><link>https://www.nattothoughts.com/p/chinas-cybersecurity-companies-advancing</link><guid isPermaLink="false">https://www.nattothoughts.com/p/chinas-cybersecurity-companies-advancing</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 19 Nov 2025 17:03:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Aq32!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90fba30-e414-44b3-bb8b-c597c0e2e90f_720x405.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Western governments are grappling with how private-sector offensive cyber capabilities should fit into state operations. This raises a number of practical <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/cyber-privateers-the-return-of-the-hack-back-debate">questions</a>: If a state tasked a company with carrying out cyber operations against an adversary, who inside those organizations would actually carry out offensive work?<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> How would these units be structured for government tasks? And how would offensive activity coexist with a company&#8217;s day-to-day R&amp;D and commercial operations?</p><p>In China, these questions are far less abstract. Private companies have been core contributors to national cyber capability building for years, supported by both policy and institutional design. They develop many of the tools, techniques, and forms of expertise that underpin defensive security products and can also be leveraged for state-sponsored cyber operations. The clearest organizational expression of this approach is companies&#8217; widespread use of <strong>attack-defense labs (&#25915;&#38450;&#23454;&#39564;&#23460;)</strong>, internal units that merge defensiv&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/chinas-cybersecurity-companies-advancing">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[When Privileged Access Falls into the Wrong Hands: Chinese Companies in Microsoft’s MAPP Program]]></title><description><![CDATA[Chinese companies face conflicting pressures between MAPP&#8217;s non-disclosure requirements and domestic policies that incentivize or mandate vulnerability disclosure to the state.]]></description><link>https://www.nattothoughts.com/p/when-privileged-access-falls-into</link><guid isPermaLink="false">https://www.nattothoughts.com/p/when-privileged-access-falls-into</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Thu, 31 Jul 2025 16:32:47 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b07d2c53-6b69-4554-9a0c-034eafed25b7_614x837.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On July 25, 2025, Bloomberg <a href="https://www.bloomberg.com/news/articles/2025-07-25/microsoft-sharepoint-hack-probe-on-whether-chinese-hackers-found-flaw-via-alert?srnd=undefined">reported </a>that Microsoft is investigating whether a leak from its Microsoft Active Protections Program (MAPP) allowed Chinese hackers to exploit a SharePoint vulnerability before a patch was released. Microsoft attributed the campaign &#8211; dubbed &#8220;ToolShell&#8221; after the custom remote access trojan used &#8211; to three China-linked threat actors: Linen Typhoon, Violet Typhoon, and Storm-2603. The attackers reportedly compromised over 400 organizations worldwide, including the U.S. National Nuclear Security Administration.</p><p>Launched in 2008, MAPP is designed to reduce the time between the discovery of a vulnerability and the deployment of patches. By giving trusted security vendors early access to technical details about upcoming patches, Microsoft enables them to release protections (such as antivirus signatures and intrusion detection rules) in sync with its monthly updates. The program, however, relies on strict compliance with non-disclosure agreements and the secure &#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/when-privileged-access-falls-into">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluesky Should Outsmart China's Public Opinion Monitoring Tools to Safeguard Public Discourse ]]></title><description><![CDATA[The Chinese government has leveraged public opinion analysis systems to target U.S. social media platforms to tamper with public discourse in the past. Will Bluesky be included? most likely yes.]]></description><link>https://www.nattothoughts.com/p/bluesky-should-outsmart-chinas-public</link><guid isPermaLink="false">https://www.nattothoughts.com/p/bluesky-should-outsmart-chinas-public</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 11 Dec 2024 17:02:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb98f2fba-3037-490c-88c2-1b5094fa0043_1552x846.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<pre><code><em>This post is authored by guest contributor <a href="https://www.linkedin.com/in/eugenio-benincasa-07a9517a/">Eugenio Benincasa</a>, a senior researcher at the Center for Security Studies at the Swiss Federal Institute of Technology in Zurich (ETH Zurich).</em></code></pre><p>In a<a href="https://bsky.app/profile/stamos.org/post/3lbuce44nht27"> November 26 post</a> on the microblogging social networking service Bluesky, Alex Stamos, the Chief Information Security Officer for the cybersecurity company SentinelOne, highlighted several key points about how People&#8217;s Republic of China (PRC) leverages US social media platforms, such as X, for influence operations. Stamos made the following points:</p><ol><li><p>Many underestimate the extent of the PRC's efforts at influencing the U.S. social media landscape;</p></li><li><p>The erosion of Trust and Safety at X has turned the platform into a &#8220;playground for PRC actors&#8221;;</p></li><li><p>Although PRC-affiliated actors complain about users moving from X to Bluesky, that platform too could also prove fertile ground for Chinese influence operations.</p></li></ol><p>China has long used X to drive influence campaigns, leveraging its user base and algorithms to amplify na&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/bluesky-should-outsmart-chinas-public">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Reconnaissance Scanning Tools Used by Chinese Threat Actors and Those Available in Open Source]]></title><description><![CDATA[China has its own ecosystem of scanning tools, whether for good or ill.]]></description><link>https://www.nattothoughts.com/p/reconnaissance-scanning-tools-used</link><guid isPermaLink="false">https://www.nattothoughts.com/p/reconnaissance-scanning-tools-used</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 04 Sep 2024 16:00:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QKfz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2454ba27-edaa-492c-a1e9-2fd9f05f53f2_804x653.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>At the end of May, the Natto Team looked into threat group <a href="https://nattothoughts.substack.com/p/apt41s-reconnaissance-techniques">APT41&#8217;s reconnaissance techniques and toolkit</a>. As we continue our ongoing research on Chinese threat groups, we discovered several other Chinese threat groups using similar reconnaissance techniques and tools to those APT41 used, such as Nmap, a free and open-source network scanner. We also came across reconnaissance techniques and scanning tools that were unique to some of the Chinese threat groups. In addition, like APT41, Chinese threat groups heavily use open-source and locally developed tools, whether <a href="https://nattothoughts.substack.com/p/who-has-the-best-scanning-tools-in">well-known security tools</a> or customized malware.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QKfz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2454ba27-edaa-492c-a1e9-2fd9f05f53f2_804x653.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QKfz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2454ba27-edaa-492c-a1e9-2fd9f05f53f2_804x653.png 424w, https://substackcdn.com/image/fetch/$s_!QKfz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2454ba27-edaa-492c-a1e9-2fd9f05f53f2_804x653.png 848w, https://substackcdn.com/image/fetch/$s_!QKfz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2454ba27-edaa-492c-a1e9-2fd9f05f53f2_804x653.png 1272w, https://substackcdn.com/image/fetch/$s_!QKfz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2454ba27-edaa-492c-a1e9-2fd9f05f53f2_804x653.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QKfz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2454ba27-edaa-492c-a1e9-2fd9f05f53f2_804x653.png" width="804" height="653" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2454ba27-edaa-492c-a1e9-2fd9f05f53f2_804x653.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:653,&quot;width&quot;:804,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:111657,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QKfz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2454ba27-edaa-492c-a1e9-2fd9f05f53f2_804x653.png 424w, https://substackcdn.com/image/fetch/$s_!QKfz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2454ba27-edaa-492c-a1e9-2fd9f05f53f2_804x653.png 848w, https://substackcdn.com/image/fetch/$s_!QKfz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2454ba27-edaa-492c-a1e9-2fd9f05f53f2_804x653.png 1272w, https://substackcdn.com/image/fetch/$s_!QKfz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2454ba27-edaa-492c-a1e9-2fd9f05f53f2_804x653.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Tools, malware, threat groups and threat campaigns mentioned in this report. Source: <a href="https://nattothoughts.substack.com/">Natto Thoughts</a></figcaption></figure></div><h1>APT10, GALLIUM and Stately Taurus Use NBTscan or Modified NBTscan &#8211; a Tool That Has Appeared Repeatedly Over Ten Years</h1><p>At least three Chinese state threat groups, including APT10 (a.k.a <a href="https://attack.mitre.org/groups/G0045/">menuPass</a>, Stone Panda, POTASSIUM (Purple Typhoon); <a href="https://attack.mitre.org/groups/G0093/">GALLIUM</a> (a.k.a Granite Typhoon), and <a href="https://unit42.paloaltonetworks.com/stately-taurus-attacks-se-asian-government/">Stately &#8230;</a></p>
      <p>
          <a href="https://www.nattothoughts.com/p/reconnaissance-scanning-tools-used">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Who Has the Best Scanning Tools in China? ]]></title><description><![CDATA[Recent &#8220;China Cybersecurity Industry Panorama&#8221; gives one assessment of China&#8217;s top scanning companies.]]></description><link>https://www.nattothoughts.com/p/who-has-the-best-scanning-tools-in</link><guid isPermaLink="false">https://www.nattothoughts.com/p/who-has-the-best-scanning-tools-in</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 26 Jun 2024 16:00:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hlVt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8041481-7a52-4e4e-82fa-a3bf6b9624d7_421x457.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>China has developed a robust cybersecurity industry along with the explosive growth of the country&#8217;s information and communications technology (ICT) sector in the past two decades. In 2023, revenue from information security products and services in China reached 223.2 billion RMB (US$31 billion), a year-on-year increase of 12.4%, according to <a href="https://wap.miit.gov.cn/gxsj/tjfx/rjy/art/2024/art_5af672124ebc48149d9c793b6ca7ed79.html">data</a> from the Chinese Ministry of Industry and Information Technology (MIIT). Meanwhile, <a href="https://www.china-cia.org.cn/home/WorkDetail?id=6507c1770200331a08c9145b">as of June 2023</a>, China had a total of 3984 information security products and services companies, a year-on-year growth of 22.4%. 26 of 3984 companies, less than 1 percent, were public companies. </p><p>The April 2024 edition of the annual China Cybersecurity Industry Panorama gives a glimpse at the top providers of information security products and services.</p><p>Security Bull (a.k.a AQNIU.COM)(&#23433;&#20840;&#29275;), a well-known Chinese information security media and flagship think tank with a targeted clientele on cybersecurity decision makers, was the organizer of this 11<sup>th</sup> edition of <a href="https://www.secrss.com/articles/65195">&#8230;</a></p>
      <p>
          <a href="https://www.nattothoughts.com/p/who-has-the-best-scanning-tools-in">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[APT41’s Reconnaissance Techniques and Toolkit: Nmap and What Else?]]></title><description><![CDATA[APT41 and other Chinese malicious cyber actors can choose from numerous reconnaissance tools developed in China and abroad, including those developed for legitimate defensive purposes.]]></description><link>https://www.nattothoughts.com/p/apt41s-reconnaissance-techniques</link><guid isPermaLink="false">https://www.nattothoughts.com/p/apt41s-reconnaissance-techniques</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 29 May 2024 16:02:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Se4e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabb143d8-18c8-4c54-ae0e-98bad992dbf9_1152x640.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the previous report &#8220;<a href="https://nattothoughts.substack.com/p/i-soon-toolkit-what-is-tz">i-SOON Toolkit: What is &#8216;TZ&#8217;?</a>&#8221;, the Natto Team discovered the importance of network reconnaissance work for the Chinese Public Security bureaus and companies in the information security industry that support the work. Reconnaissance &#8211; gathering information on a target &#8211; is the first step that cyber threat actors take in an operation, according to the so-called <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">Cyber Kill Chain</a> framework. Reconnaissance provides the threat actor with both non-technical information on the target, such as a target&#8217;s organizational details and information on personnel, and technical information, including information about the network, hosts, applications, and users. Over the years, <a href="https://dl.acm.org/doi/pdf/10.1145/3538704">researchers</a> have observed and studied various reconnaissance techniques and tools commonly used in targeted attack cases. In this report, the Natto Team looks into the reconnaissance techniques and toolkit of <a href="https://nattothoughts.substack.com/p/i-soon-another-company-in-the-apt41">APT41</a>, a Chinese state-sponsored hacking group, and explores popular network reconnaissance too&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/apt41s-reconnaissance-techniques">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[i-SOON: “Significant Superpower” or Just Getting the Job Done? ]]></title><description><![CDATA[Moving beyond a purely technical focus on TTPs and infrastructure, a business analysis of People, Process, and Technology shows i-SOON&#8217;s strengths and limitations]]></description><link>https://www.nattothoughts.com/p/i-soon-significant-superpower-or</link><guid isPermaLink="false">https://www.nattothoughts.com/p/i-soon-significant-superpower-or</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Thu, 07 Mar 2024 23:49:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!k-PR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bc7113f-ddbf-4e1e-b8e8-8daf1b3a979e_1406x787.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The <a href="https://nattothoughts.substack.com/p/i-soon-kicking-off-the-year-of-the">previous Natto Thoughts report </a>on the recent leak of documents from the Chinese IT company i-SOON discussed the complex network of China&#8217;s information security companies and their precarious relationship with their &#8220;clients.&#8221; As we understand, all these companies, no matter whether we call them &#8220;hackers-for-hire&#8221; or &#8220;commercial hacking industry,&#8221; are ultimately businesses with profit as their bottom line, as the Natto Team told The <a href="https://www.thewirechina.com/2024/03/03/hacking-the-hackers-i-soon-chengdu-404-data-leak/">Wire China</a>. Therefore, it is helpful for us to look into i-SOON as a case study using the <a href="https://www.forbes.com/sites/forbestechcouncil/2022/12/29/is-the-60-year-old-people-process-technology-framework-still-useful/?sh=5857fc834ab4">60-year-old &#8220;People, Process, Technology&#8221; (PPT) Framework</a> to assess its business operation, how it got its business done and whether it was successful or not. A business-focused analysis of the i-SOON case study can shed a new light on China&#8217;s state-sponsored cyber operations. (On types of state-associated cyber operations, see the Natto Team posting &#8220;<a href="https://nattothoughts.substack.com/p/wazawaka-and-co-part-2-patriotic">Wazawaka &amp; Co., Part 2: Patriotic Hacker</a>&#8221;)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!k-PR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bc7113f-ddbf-4e1e-b8e8-8daf1b3a979e_1406x787.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!k-PR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bc7113f-ddbf-4e1e-b8e8-8daf1b3a979e_1406x787.png 424w, https://substackcdn.com/image/fetch/$s_!k-PR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bc7113f-ddbf-4e1e-b8e8-8daf1b3a979e_1406x787.png 848w, https://substackcdn.com/image/fetch/$s_!k-PR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bc7113f-ddbf-4e1e-b8e8-8daf1b3a979e_1406x787.png 1272w, https://substackcdn.com/image/fetch/$s_!k-PR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bc7113f-ddbf-4e1e-b8e8-8daf1b3a979e_1406x787.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!k-PR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bc7113f-ddbf-4e1e-b8e8-8daf1b3a979e_1406x787.png" width="1406" height="787" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2bc7113f-ddbf-4e1e-b8e8-8daf1b3a979e_1406x787.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:787,&quot;width&quot;:1406,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:142014,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!k-PR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bc7113f-ddbf-4e1e-b8e8-8daf1b3a979e_1406x787.png 424w, https://substackcdn.com/image/fetch/$s_!k-PR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bc7113f-ddbf-4e1e-b8e8-8daf1b3a979e_1406x787.png 848w, https://substackcdn.com/image/fetch/$s_!k-PR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bc7113f-ddbf-4e1e-b8e8-8daf1b3a979e_1406x787.png 1272w, https://substackcdn.com/image/fetch/$s_!k-PR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bc7113f-ddbf-4e1e-b8e8-8daf1b3a979e_1406x787.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nattothoughts.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Natto Thoughts! Subscribe for free to receive new post&#8230;</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://www.nattothoughts.com/p/i-soon-significant-superpower-or">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Pinduoduo: When Business Success Comes with Hacking]]></title><description><![CDATA[&#8220;The white hat hackers should be guarding security, but they were abused as black hat hackers against users,&#8221; said one critic.]]></description><link>https://www.nattothoughts.com/p/pinduoduo-when-business-success-comes</link><guid isPermaLink="false">https://www.nattothoughts.com/p/pinduoduo-when-business-success-comes</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Fri, 26 May 2023 04:28:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yhul!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2740dc8d-69d0-4ec7-b2a9-3c380d27dd31_1002x498.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<pre><code><strong>Note added on August 21, 2024</strong>: This is a post the Natto Team published on May 26, 2023. It looks into China&#8217;s e-commerce company Pinduoduo (PDD) and its alleged hacking team after the Google Play store suspended PDD because of finding malware in some versions of the app. Our research indicates that PDD&#8217;s operating model - a social commerce model of &#8220;social network promotion for all people&#8221; has made it easy to hack users. The model analyzes users&#8217; habits, interests and preferences to offer personalized push notifications and ads that attract users to use the app more often and place more orders. A white/black hat hacking team could combine these standard e-commerce functions &#8211; which are not necessarily illegal &#8211; with exploitation of mobile phone vulnerabilities to enable unauthorized access to user data and information. PDD figured out this shortcut early on in its explosive growth. Fortunately for users, the country&#8217;s top mobile vulnerability mining expert had the moral decency to ref&#8230;</code></pre>
      <p>
          <a href="https://www.nattothoughts.com/p/pinduoduo-when-business-success-comes">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>