<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Natto Thoughts: Operators & Profiles]]></title><description><![CDATA[This section profiles the individuals behind Chinese cyber operations – tracing their careers, networks, and trajectories across the state security apparatus, commercial firms, and the broader hacker ecosystem.]]></description><link>https://www.nattothoughts.com/s/operators-and-profiles</link><image><url>https://substackcdn.com/image/fetch/$s_!t3eQ!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png</url><title>Natto Thoughts: Operators &amp; Profiles</title><link>https://www.nattothoughts.com/s/operators-and-profiles</link></image><generator>Substack</generator><lastBuildDate>Thu, 21 May 2026 06:36:04 GMT</lastBuildDate><atom:link href="https://www.nattothoughts.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Natto Thoughts]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[nattothoughts@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[nattothoughts@substack.com]]></itunes:email><itunes:name><![CDATA[Natto Team]]></itunes:name></itunes:owner><itunes:author><![CDATA[Natto Team]]></itunes:author><googleplay:owner><![CDATA[nattothoughts@substack.com]]></googleplay:owner><googleplay:email><![CDATA[nattothoughts@substack.com]]></googleplay:email><googleplay:author><![CDATA[Natto Team]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem]]></title><description><![CDATA[How one man&#8217;s career reveals the interconnected web of China&#8217;s state security apparatus, cybersecurity firms, and strategic industries]]></description><link>https://www.nattothoughts.com/p/hafnium-linked-hacker-xu-zewei-riding</link><guid isPermaLink="false">https://www.nattothoughts.com/p/hafnium-linked-hacker-xu-zewei-riding</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 23 Jul 2025 16:01:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oCJv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7187a1f-7072-4087-8742-00b44925ab40_1085x1276.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<pre><code><code>                     Note added May 13 2026

The arrest of HAFNIUM-linked hacker Xu Zewei at Milan Malpensa Airport in July 2025 has reached a new chapter: on April 27, 2026, the DOJ announced that Xu had been successfully extradited from Italy and appeared in federal court in Houston. Originally posted July 23, 2025, this analysis remains relevant as the case moves from indictment to courtroom and several of the questions it raised now take on new urgency:

    </code><strong> The Overlapping Identities Question</strong><code>: Xu's defense &#8212; centered on his employment at GTA Semiconductor and claims of mistaken identity &#8212; will now be tested before a U.S. judge. Our original reporting examined these overlapping professional affiliations in detail, and they remain central to how the case will be argued on both sides.

     </code><strong>The Front Company Model on Trial</strong><code>: The indiscriminate, profit-driven contractor network the DOJ described when charges were first unsealed is now the subject of live court proceedings &#8212; moving the debate over how the MSS manages its hacker ecosystem from policy circles into a federal courtroom.

     </code><strong>HAFNIUM's Long Shadow</strong><code>: The indictment's timeline, stretching HAFNIUM's known activity back to February 2020 and encompassing more than 12,700 compromised U.S. organizations, are the facts a jury may now ultimately weigh.

     </code><strong>The Yu Pingan Comparison</strong><code>: The comparison drawn in our original reporting between Xu's case and that of malware developer Yu Pingan &#8212; caught, prosecuted, and ultimately returned to China &#8212; remains the most open question of all. Xu is among the first hackers linked to Chinese intelligence to face trial on U.S. soil, making the outcome a potential bellwether. Xu's co-defendant Zhang Yu remains at large.</code></code></pre><p>On July 3, 2025, at Milan Malpensa Airport, <a href="https://www.ansa.it/english/newswire/english_service/2025/07/07/ansachinese-spy-arrested-in-italy-on-us-warrant_9f5bbfe6-74ef-4f78-bb1e-fcf01f755652.html">Italian police arrested</a> <strong>Xu Zewei</strong> (<strong>&#24464;&#27901;&#20255;</strong>), whom U.S. authorities allege to be a hacker contracted by the Chinese state. Following the news about Xu&#8217;s arrest from Italian media, on July 8, the U.S. Department of Justice (US DoJ) issued a <a href="https://www.justice.gov/opa/pr/justice-department-announces-arrest-prolific-chinese-state-sponsored-contract-hacker">press release</a> and unsealed an <a href="https://www.justice.gov/opa/media/1407196/dl">indictment</a>, accusing Xu Zewei and his co-defendant <strong>Zhang Yu</strong> (<strong>&#24352;&#23431;</strong>) of participating in hacking activities between February 2020 and June 2021. These activities were reportedly linked to the Advanced Persistent Threat (APT) group <strong><a href="https://attack.mitre.org/groups/G0125/">HAFNIUM</a></strong> (also known as Silk Typhoon or APT27), involving the theft of COVID-19 research from universities, exploitation of Microsoft Exchange Server vulnerabilities, and compromising thousands of computers worldwide, including those in the United States. As of this writing, Xu remains in custody near Milan and is undergoing extradition proceedings to the United States. During his initial court appearance, <a href="https://www.cnn.com/2025/07/08/politics/us-extradition-chinese-man-accused-hacking-covid-research">Xu asserted</a> that he &#8220;has nothing to do with the case,&#8221; while <a href="https://www.reuters.com/legal/litigation/us-says-chinese-state-sponsored-contract-hacker-arrested-last-week-italy-us-2025-07-08">Xu&#8217;s lawyer stated</a> that &#8220;Xu is a victim of mistaken identity, his surname is common in China, and his mobile phone was stolen in 2020.&#8221; It was further argued that Xu is a technician employed by (Shanghai) GTA Semiconductor Co. Ltd., on holiday in Italy with his wife.</p><p>For Xu Zewei and his wife, their visit to Milan&#8212;a dream vacation&#8212;took an unexpected turn with the arrest. The circumstances surrounding Xu&#8217;s detention have prompted several questions: Is this Xu Zewei the individual sought by authorities? Could he be a victim of identity theft, as contended by his legal counsel? Which companies has Xu worked for? Xu claims employment with <strong><a href="https://web.archive.org/web/20250711223004/https:/www.gtasemi.com.cn/about-gta/overview">Shanghai GTA Semiconductor Co. Ltd</a></strong> (<strong>GTA</strong>) (<strong>&#19978;&#28023;&#31215;&#22612;&#21322;&#23548;&#20307;</strong>), whereas the US DoJ asserts Xu worked for <strong>Shanghai Powerock Network Co. Ltd</strong>. (<strong>Powerock</strong>) (<strong>&#19978;&#28023;&#21183;&#23721;&#32593;&#32476;&#31185;&#25216;&#21457;&#23637;&#26377;&#38480;&#20844;&#21496;</strong>). Further complicating the situation, findings by the Natto Team and <a href="https://x.com/byron_wan/status/1943168238646644848?s=46">others</a> indicate that between 2022 and at least mid-2024, <a href="https://web.archive.org/web/20250710014854/https:/mp.weixin.qq.com/s/vPCCfyzzbhCNfc8Rih5o7w">Xu</a> served as director of security technology at <strong>Chaitin Tech</strong> (<strong>&#38271;&#20141;&#31185;&#25216;</strong>), a Chinese cybersecurity firm established by members of Tsinghua University&#8217;s <a href="https://web.archive.org/web/20250516120338/https:/www.chaitin.cn/en/intro">Blue Lotus CTF team</a>. As the Natto Team has reported previously, Chaitin Tech is recognized for its <a href="https://nattothoughts.substack.com/i/147490702/countless-open-source-scanning-tools-available">top scanning products</a> and vulnerability research capabilities and acts as a <a href="https://nattothoughts.substack.com/i/145841015/top-scanning-capability-means-more-responsibility">technical support unit</a> for both <a href="https://nattothoughts.substack.com/i/145841015/top-scanning-capability-means-more-responsibility">the China National Vulnerability Database of Information Security (CNNVD) and the China National Vulnerability Database (CNVD).</a></p><p>This post aims to clarify the ambiguities surrounding Xu&#8217;s professional affiliations, which illustrate the interconnected nature of China&#8217;s cyber ecosystem, where talent may simultaneously pursue personal, business, and state interests. Meanwhile, the evolving operational methods of the Chinese Ministry of State Security are also noteworthy.</p><p></p>
      <p>
          <a href="https://www.nattothoughts.com/p/hafnium-linked-hacker-xu-zewei-riding">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Zhou Shuai: A Hacker’s Road to APT27 ]]></title><description><![CDATA[US-sanctioned, allegedly APT27-associated actor Zhou Shuai represents a group of Chinese elite hackers who have become an important resource for Chinese state cyber operations.]]></description><link>https://www.nattothoughts.com/p/zhou-shuai-a-hackers-road-to-apt27</link><guid isPermaLink="false">https://www.nattothoughts.com/p/zhou-shuai-a-hackers-road-to-apt27</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 19 Mar 2025 16:03:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lKTT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001a97f7-323b-45b8-861a-071885adef64_468x576.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On March 5, 2025, in addition to unsealing the <a href="https://www.justice.gov/opa/media/1391901/dl">i-SOON indictment</a>, the US Department of the Treasury <a href="https://home.treasury.gov/news/press-releases/sb0042">sanctioned</a> Zhou Shuai (&#21608;&#24069;) (a.k.a Coldface) &#8212; a Chinese hacker associated with allegedly state-backed cyber threat group APT27 &#8212; and Zhou&#8217;s company, Shanghai Heiying Information Technology Company (&#19978;&#28023;&#40657;&#33521;&#20449;&#24687;&#25216;&#26415;&#26377;&#38480;&#20844;&#21496;). On the same day, the US Department of Justice (US DoJ) unsealed <a href="https://www.justice.gov/usao-dc/pr/chinese-nationals-ties-prc-government-and-apt27-charged-computer-hacking-campaign-profit">indictments</a> charging <a href="https://www.fbi.gov/wanted/cyber/zhou-shuai">Zhou Shuai</a> and <a href="https://www.fbi.gov/wanted/cyber/yin-kecheng">Yin Kecheng</a>, his alleged co-conspirator, for malicious cyber activity tracing from 2011 to the present-day. Zhou Shuai&#8217;s name may be new to many of us. However, in the Chinese hacking world, Zhou Shuai is a renowned hacker who was among men of the moment - the first-generation Chinese patriotic hackers in the mid 90s. In his evolution into an allegedly state-sponsored hacker behind APT27, Zhou Shuai exemplifies a cohort of highly skilled Chinese hackers who have become a significant asset for Chinese state cyber operations.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lKTT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001a97f7-323b-45b8-861a-071885adef64_468x576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lKTT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001a97f7-323b-45b8-861a-071885adef64_468x576.png 424w, https://substackcdn.com/image/fetch/$s_!lKTT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001a97f7-323b-45b8-861a-071885adef64_468x576.png 848w, https://substackcdn.com/image/fetch/$s_!lKTT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001a97f7-323b-45b8-861a-071885adef64_468x576.png 1272w, https://substackcdn.com/image/fetch/$s_!lKTT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001a97f7-323b-45b8-861a-071885adef64_468x576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lKTT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001a97f7-323b-45b8-861a-071885adef64_468x576.png" width="468" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/001a97f7-323b-45b8-861a-071885adef64_468x576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:468,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:41872,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nattothoughts.substack.com/i/159302895?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001a97f7-323b-45b8-861a-071885adef64_468x576.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lKTT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001a97f7-323b-45b8-861a-071885adef64_468x576.png 424w, https://substackcdn.com/image/fetch/$s_!lKTT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001a97f7-323b-45b8-861a-071885adef64_468x576.png 848w, https://substackcdn.com/image/fetch/$s_!lKTT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001a97f7-323b-45b8-861a-071885adef64_468x576.png 1272w, https://substackcdn.com/image/fetch/$s_!lKTT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F001a97f7-323b-45b8-861a-071885adef64_468x576.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Zhou Shuai: from Founding Member of Green Army to the Org&#8230;</h1>
      <p>
          <a href="https://www.nattothoughts.com/p/zhou-shuai-a-hackers-road-to-apt27">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Sichuan Silence Information Technology and Guan Tianfeng: Your Criminal Our Hero]]></title><description><![CDATA[Even before DeepSeek's debut sparked pride among Chinese netizens, US sanctions on Sichuan Silence developer Guan Tianfeng triggered online vows to "march forward" in cyberpower competition]]></description><link>https://www.nattothoughts.com/p/sichuan-silence-information-technology-fe9</link><guid isPermaLink="false">https://www.nattothoughts.com/p/sichuan-silence-information-technology-fe9</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 05 Feb 2025 17:02:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3t0d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f9d6dfa-8f5a-4651-aace-4e2c414bbe52_468x538.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The release of the DeepSeek AI chatbot in January 2025, shaking up stock markets and the American tech sector, set off an explosion of glee in Chinese social media. Chinese netizens portrayed the event as &#8220;the tipping point for the global technological rivalry with the United States and the &#8216;darkest hour&#8217; in Silicon Valley,&#8221; <a href="https://www.nytimes.com/2025/01/28/business/deepseek-china-reaction.html">according</a> to the <em>New York Times</em>. </p><p>The previous month, Chinese social media users had expressed similar enthusiasm about the Chinese cybersecurity company Sichuan Silence Information Technology Company (Sichuan Silence), and one of its employees, Guan Tianfeng (&#20851;&#22825;&#28925;), after the United States took action against that company. Less than a week after the Natto Team published the post &#8220;<a href="https://nattothoughts.substack.com/p/sichuan-silence-information-technology">Sichuan Silence Information Technology: Great Sounds are Often Inaudible,</a><em>&#8221;</em> on December 10, 2024 the US Department of the Treasury <a href="https://home.treasury.gov/news/press-releases/jy2742">sanctioned</a> Sichuan Silence and its employee Guan Tianfeng for compromising tens of thousands of firewalls worldwide in April 2020. Also on December 10, the US D&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/sichuan-silence-information-technology-fe9">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Self-Proclaimed Vigilante Hacker Casts Light on Chinese Criminals’ Global Cyber Scamming Sweatshops]]></title><description><![CDATA[How do cyber scam operations work? What kinds of tools and technology do criminals use to achieve their goals? And why do telecom fraud cases seem unstoppable?]]></description><link>https://www.nattothoughts.com/p/self-proclaimed-vigilante-hacker</link><guid isPermaLink="false">https://www.nattothoughts.com/p/self-proclaimed-vigilante-hacker</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Fri, 01 Sep 2023 03:47:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Mg6r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5770dd83-139e-4e15-8947-b62a36301f7f_4443x6664.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the past three years, cyber scam operations run by Chinese criminal groups have proliferated rapidly in China&#8217;s neighboring countries in Southeast Asia. These criminal groups have targeted not only Chinese-speaking victims in China and overseas but also English-speaking victims <a href="https://www.voanews.com/a/chinese-cybercrime-syndicates-in-myanmar-now-target-victims-worldwide/7158750.html">worldwide</a>.  In particular, organized Chinese criminal groups operating on the Thai-Myanmar border have become a global security menace, &#8220;threatening internet users worldwide with online scams and financial fraud, using trafficked &#8216;cyber slaves&#8217; to carry out their crimes,&#8221; according to a June 2023 <a href="https://www.usip.org/publications/2023/06/criminal-cancer-spreads-southeast-asia">report</a> by the United States Institute of Peace. A recent <a href="https://www.ohchr.org/en/press-releases/2023/08/hundreds-thousands-trafficked-work-online-scammers-se-asia-says-un-report">United Nations report</a> pointed out criminal collectives have coerced hundreds of thousands of individuals in Southeast Asia into participating in unlawful online scams. These fraudulent activities include false romantic ploys, bogus investment pitches and illegal gambling schemes.</p><p>The Chinese government has worked with counterparts in Thailand, Myanmar and Laos &#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/self-proclaimed-vigilante-hacker">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>