<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Natto Thoughts: Untangling the Aliases]]></title><description><![CDATA[This section examines the challenges of identifying and attributing Chinese threat actors – from overlapping APT labels and contested group boundaries to the methodologies analysts use to cut through the noise.]]></description><link>https://www.nattothoughts.com/s/the-attribution-problem</link><image><url>https://substackcdn.com/image/fetch/$s_!t3eQ!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png</url><title>Natto Thoughts: Untangling the Aliases</title><link>https://www.nattothoughts.com/s/the-attribution-problem</link></image><generator>Substack</generator><lastBuildDate>Wed, 20 May 2026 04:36:17 GMT</lastBuildDate><atom:link href="https://www.nattothoughts.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Natto Thoughts]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[nattothoughts@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[nattothoughts@substack.com]]></itunes:email><itunes:name><![CDATA[Natto Team]]></itunes:name></itunes:owner><itunes:author><![CDATA[Natto Team]]></itunes:author><googleplay:owner><![CDATA[nattothoughts@substack.com]]></googleplay:owner><googleplay:email><![CDATA[nattothoughts@substack.com]]></googleplay:email><googleplay:author><![CDATA[Natto Team]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Beyond the Aliases: Decoding Chinese Threat Group Attribution and the Human Factor]]></title><description><![CDATA[Examining the overlap between APT27, HAFNIUM, and Silk Typhoon through recent U.S. government disclosures, and why understanding the humans behind the keyboard is important for cyber defenders]]></description><link>https://www.nattothoughts.com/p/beyond-the-aliases-decoding-chinese</link><guid isPermaLink="false">https://www.nattothoughts.com/p/beyond-the-aliases-decoding-chinese</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 22 Oct 2025 16:02:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!A03O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d29aed0-9fdf-49e1-82b3-bdf222dd2f0d_1553x497.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Since March 2025, the U.S. government has exposed Chinese hackers and entities linked to threat groups publicly tracked as <strong>APT27</strong>, <strong>HAFNIUM</strong>, <strong>Silk Typhoon</strong>, and other threat group monikers. Among these named Advanced Persistent Threat (APT) groups, technical analysis and observed intrusion activities from the cybersecurity community have provided group tracking criteria and measures to mitigate harm and to eradicate malware from systems and networks. Because cybersecurity firms often use different threat models, have their own standards for clustering intrusions, and closely guard their <a href="https://www.proofpoint.com/us/threat-reference/telemetry">telemetry data</a>&#8212;often not sharing with others&#8212;we see threat groups labeled with a number of &#8220;a.k.a.&#8221; (also known as) group names. For example, the <a href="https://malpedia.caad.fkie.fraunhofer.de/actor/apt27">profile of APT27</a> on Malpedia, a community-curated online malware encyclopedia and resource, lists 16 a.k.a. group names. How do these a.k.a. groups overlap? How are they different from one another? The answers are not always clear.</p><p>Additionally, when law enforceme&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/beyond-the-aliases-decoding-chinese">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Chinese Threat Groups That Use Ransomware and Ransomware Groups That Use Chinese Names]]></title><description><![CDATA[Chinese threat groups are increasingly deploying ransomware for political reasons &#8211;but not all Chinese-named ransomware groups are Chinese]]></description><link>https://www.nattothoughts.com/p/chinese-threat-groups-that-use-ransomware</link><guid isPermaLink="false">https://www.nattothoughts.com/p/chinese-threat-groups-that-use-ransomware</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 02 Oct 2024 16:00:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4b21912-83d0-4e14-8d0d-df583367c50a_1919x1080.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><a href="https://www.infosecurity-magazine.com/webinars/attackers-threat-techniques/">Security experts</a> have observed that the line between financially motivated criminal activities and politically motivated nation-state threat activities grows increasingly blurred. Some cybercrime operations mix state and criminal cyber threat activity; for example, <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-040a">North Korean state-sponsored threat actors</a> launched cryptocurrency heists to &#8220;<a href="https://therecord.media/north-korea-cryptocurrency-hacks-un-experts">illicitly generate revenue for the country</a>.&#8221; Further blurring the lines between states and criminals, the cybercriminal ecosystem is complex and constantly evolving. The Natto Team and others have explored this ecosystem, particularly in relation to ransomware. Various threat actors can be found on online underground discussion forums and marketplaces: cybercriminals who offer an array of specialized services, from pentesters and initial access brokers, to malware developers, to translators, ransom negotiators, and even government relations specialists. A thriving market in hackers-for-hire and ransomware-as-a-service makes it possible for even un&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/chinese-threat-groups-that-use-ransomware">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Intrusion Truth Methods: How Can They Get It Right Again and Again? ]]></title><description><![CDATA[Who are the mysterious hacker whisperers Intrusion Truth? What kinds of tradecraft have they used? What can cyber threat analysts learn from them?]]></description><link>https://www.nattothoughts.com/p/intrusion-truth-methods-how-can-they</link><guid isPermaLink="false">https://www.nattothoughts.com/p/intrusion-truth-methods-how-can-they</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 10 Apr 2024 16:01:41 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1583440194369-ac78b451536a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8aGFja2VyfGVufDB8fHx8MTcxMjU5NzA3OXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1583440194369-ac78b451536a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8aGFja2VyfGVufDB8fHx8MTcxMjU5NzA3OXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1583440194369-ac78b451536a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8aGFja2VyfGVufDB8fHx8MTcxMjU5NzA3OXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1583440194369-ac78b451536a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8aGFja2VyfGVufDB8fHx8MTcxMjU5NzA3OXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1583440194369-ac78b451536a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8aGFja2VyfGVufDB8fHx8MTcxMjU5NzA3OXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1583440194369-ac78b451536a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8aGFja2VyfGVufDB8fHx8MTcxMjU5NzA3OXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1583440194369-ac78b451536a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8aGFja2VyfGVufDB8fHx8MTcxMjU5NzA3OXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="578" height="867" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1583440194369-ac78b451536a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8aGFja2VyfGVufDB8fHx8MTcxMjU5NzA3OXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3264,&quot;width&quot;:2176,&quot;resizeWidth&quot;:578,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;person in black and white mask&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="person in black and white mask" title="person in black and white mask" srcset="https://images.unsplash.com/photo-1583440194369-ac78b451536a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8aGFja2VyfGVufDB8fHx8MTcxMjU5NzA3OXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1583440194369-ac78b451536a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8aGFja2VyfGVufDB8fHx8MTcxMjU5NzA3OXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1583440194369-ac78b451536a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8aGFja2VyfGVufDB8fHx8MTcxMjU5NzA3OXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1583440194369-ac78b451536a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyNXx8aGFja2VyfGVufDB8fHx8MTcxMjU5NzA3OXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@zayyerrn">Ahmed Zayan</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>In late March 2024 the United States Department of Justice (US DoJ) <a href="https://www.justice.gov/opa/pr/seven-hackers-associated-chinese-government-charged-computer-intrusions-targeting-perceived">unsealed an indictment</a> alleging that seven Chinese hackers operated as part of Advanced Persistent Threat (APT)31 group &#8220;in support of China&#8217;s Ministry of State Security&#8217;s transnational repression, economic espionage and foreign intelligence objectives.&#8221; At the same time, the US Department of the Treasury <a href="https://home.treasury.gov/news/press-releases/jy2205">imposed sanctions</a> on APT31-affiliated company Wuhan Xiaoruizhi Science and Technology Company (&#27494;&#27721;&#26195;&#30591;&#26234;&#31185;&#25216;&#26377;&#38480;&#20844;&#21496;) (Wuhan XRZ) and on two of the seven hackers. Many of us who follow the whereabouts of Chinese threat actors had an aha moment; we recalled that <a href="https://intrusiontruth.wordpress.com/">Intrusion Truth</a>, an anonymous group that hosts a blog unmasking the real identities of Chinese threat actors, identified some of those hackers and WuhanXRZ back in May 2023. Wow, <a href="https://news.risky.biz/risky-biz-news-china-called-out-over-hacks-again/">Intrusion Truth was right (again)!</a>  Since its first post in April 2017, Intrusion Truth has revealed actors and companies associated with four Chinese APT groups&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/intrusion-truth-methods-how-can-they">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>