<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Natto Thoughts: Roots & Early Days]]></title><description><![CDATA[This section traces the roots of China's offensive cyber talent – from the elite hacker communities of the late 1990s and 2000s, through the cultural and institutional conditions that shaped them, to the career paths that brought individuals from underground forums into the commercial and state security ecosystem.]]></description><link>https://www.nattothoughts.com/s/where-it-all-began</link><image><url>https://substackcdn.com/image/fetch/$s_!t3eQ!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png</url><title>Natto Thoughts: Roots &amp; Early Days</title><link>https://www.nattothoughts.com/s/where-it-all-began</link></image><generator>Substack</generator><lastBuildDate>Thu, 21 May 2026 06:35:05 GMT</lastBuildDate><atom:link href="https://www.nattothoughts.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Natto Thoughts]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[nattothoughts@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[nattothoughts@substack.com]]></itunes:email><itunes:name><![CDATA[Natto Team]]></itunes:name></itunes:owner><itunes:author><![CDATA[Natto Team]]></itunes:author><googleplay:owner><![CDATA[nattothoughts@substack.com]]></googleplay:owner><googleplay:email><![CDATA[nattothoughts@substack.com]]></googleplay:email><googleplay:author><![CDATA[Natto Team]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[No Ranges, No Bounties, No Contests: Forging Offensive Capabilities in China’s 2000s Hacker Scene]]></title><description><![CDATA[China&#8217;s early hacking training grounds weren&#8217;t classrooms or hacking contests, but online forums, real-world targets, and freely shared offensive tools and vulnerabilities.]]></description><link>https://www.nattothoughts.com/p/no-ranges-no-bounties-no-contests</link><guid isPermaLink="false">https://www.nattothoughts.com/p/no-ranges-no-bounties-no-contests</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 27 Aug 2025 16:03:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!e5af!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9d148bf-4455-43f7-baed-71935072398e_1600x857.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<pre><code>This post is adapted from the Cyberdefense Report <a href="https://ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/before-vegas-cyberdefense-report.pdf">"Before Vegas: The &#8216;Red Hackers&#8217; Who Shaped China&#8217;s Cyber Ecosystem,"</a> published in July 2025 by the Center for Security Studies (CSS) at ETH Zurich, Switzerland.</code></pre><p>In our <a href="https://nattothoughts.substack.com/p/few-and-far-between-during-chinas">last piece</a>, we showed how truly elite offensive cyber talent has always been scarce, even within China&#8217;s massive hacker communities of the 2000s. But how did this small circle of talent actually develop offensive capabilities? In China, these fall under the broader category of &#8220;live-fire&#8221; capabilities (&#23454;&#25112;&#33021;&#21147;),<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> i.e. the ability to apply tools and techniques such as penetration testing, security operations, and incident response. As we discussed <a href="https://nattothoughts.substack.com/p/the-matrix-cup-cultivating-top-hacking">here</a>, <a href="https://nattothoughts.substack.com/p/business-priorities-of-chinese-cyber">here</a>, and <a href="https://nattothoughts.substack.com/p/butian-vulnerability-platform-forging">here</a>, hacking contests, bug bounty platforms, and cyber ranges have become core pillars of China&#8217;s modern live-fire talent pipeline. Today, these mechanisms are deeply institutionalized across universities, companies, and state-backed initiatives, serving as the backbone for identifying and training skilled operators.</p>
      <p>
          <a href="https://www.nattothoughts.com/p/no-ranges-no-bounties-no-contests">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Few and Far Between: During China’s Red Hacker Era, Patriotic Hacktivism Was Widespread—Talent Was Not]]></title><description><![CDATA[Inside the small, elite circles that powered China&#8217;s massive hacker communities in the late 1990s and 2000s.]]></description><link>https://www.nattothoughts.com/p/few-and-far-between-during-chinas</link><guid isPermaLink="false">https://www.nattothoughts.com/p/few-and-far-between-during-chinas</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 13 Aug 2025 16:02:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ypOm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae33562e-3979-4d38-85d7-8a1fc151b346_490x490.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<pre><code>This post is excerpted from the Cyberdefense Report <a href="https://css.ethz.ch/en/center/CSS-news/2025/07/before-vegas-the-red-hackers-who-shaped-chinas-cyber-ecosystem.html">"Before Vegas: The &#8216;Red Hackers&#8217; Who Shaped China&#8217;s Cyber Ecosystem,"</a> published in July 2025 by the Center for Security Studies (CSS) at ETH Zurich, Switzerland.</code></pre><p>Truly elite offensive cyber talent has always been rare. Despite the growth of cybersecurity communities worldwide, and the emergence of extensive and structured talent pipelines in countries like China &#8211; examined in Natto pieces<a href="https://nattothoughts.substack.com/p/the-matrix-cup-cultivating-top-hacking"> 1</a>,<a href="https://nattothoughts.substack.com/p/when-a-vocational-college-becomes"> 2</a> and<a href="https://nattothoughts.substack.com/p/debating-chinas-ai-path-alternative"> 3</a> &#8211; which have made high-quality talent more widely available, truly exceptional individuals remain scarce and highly sought after.</p><p>As early as 2013, the<a href="https://www.airuniversity.af.edu/CASI/Display/Article/2485204/plas-science-of-military-strategy-2013/"> Science of Military Strategy</a>&#8212;a foundational text published by the PLA Academy of Military Science&#8212;noted that while cyber warfare benefits from a &#8220;broad mass base,&#8221; the traditional Chinese military ideal of &#8220;all people are soldiers&#8221; does not translate to cyberspace. Instead, it emphasized that only an &#8220;<a href="https://www.bloomsburycollections.com/monograph-detail?docid=b-9798881817602&amp;pdfid=9798881817602.ch-8.pdf&amp;tocid=b-9798881817602-chapter8">extremely lean</a>&#8221; cohort possessed the capabilities required for high-level cyber operations.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><p>&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/few-and-far-between-during-chinas">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Defense-Through-Offense Mindset: From a Taiwanese Hacker to the Engine of China’s Cybersecurity Industry]]></title><description><![CDATA[The belief that offense enables defense in cyberspace, first rooted in China&#8217;s 1990s hacker culture, has since permeated the country&#8217;s cyber ecosystem]]></description><link>https://www.nattothoughts.com/p/defense-through-offense-mindset-from</link><guid isPermaLink="false">https://www.nattothoughts.com/p/defense-through-offense-mindset-from</guid><dc:creator><![CDATA[Eugenio Benincasa]]></dc:creator><pubDate>Wed, 11 Jun 2025 16:03:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!sVPA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc159033-cdfb-4fbc-ab46-308234deeab7_1040x520.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Across the globe, a core tenet is gradually gaining traction in the cyber domain: passive defense alone is not enough. A limited but growing number of states have embraced some form of active defense&#8212;the idea that effective cybersecurity requires not just detection and response, but also preemptive action to disrupt adversaries.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><p>In the United States, this principle is formally codified in the 2018 Department of Defense Cyber Strategy under the doctrine of &#8220;Defend Forward,&#8221; authorizing U.S. Cyber Command and the NSA to proactively disrupt threats within adversaries&#8217; own networks. Variations of this approach <a href="https://www.darkreading.com/cybersecurity-operations/japan-offense-new-cyber-defense-bill">have since been adopted</a> by other governments. In China, the concept of active defense <a href="https://www.andrewerickson.com/wp-content/uploads/2019/05/DoD_China-Report_2019.pdf">is grounded</a> in longstanding military strategy. Although this principle extends to cyberspace - <a href="https://www.gov.cn/zhengce/2015-05/26/content_2868988.htm#">as outlined in China&#8217;s 2015 military strategy</a> - China has not yet articulated a dedicated active cyber defense doctrine comparable to that of the United States.</p><p>Yet in practice, China&#8217;s cyber ecosystem refl&#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/defense-through-offense-mindset-from">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[From the World of “Hacker X Files” to the Whitewashed Business Sphere]]></title><description><![CDATA[Jiang Jintao&#8217;s journey from hacker to infosec entrepreneur illustrates the blend of ambition, skill, and changes in China's cybersecurity industry]]></description><link>https://www.nattothoughts.com/p/stories-of-a-chinese-hacker-from</link><guid isPermaLink="false">https://www.nattothoughts.com/p/stories-of-a-chinese-hacker-from</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 14 May 2025 16:02:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gSMd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02ac499c-f774-48d4-8508-c8318eb111b4_768x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Previously, the Natto Team briefly explored the history of renowned Chinese hacker <a href="https://nattothoughts.substack.com/p/zhou-shuai-a-hackers-road-to-apt27">Zhou Shuai</a>, who has been sanctioned and indicted by the US government for alleged APT27-linked malicious cyber activity since 2011. We find that stories of Chinese hackers are often fascinating, as they not only help us to understand the motivations and intents of those behind the keyboard but also reveal how China&#8217;s information security industry has evolved and how this evolution connects with Chinese cyber operations. Recently, the Natto Team came across a <a href="https://web.archive.org/web/20180628042648/http:/www.pingwest.com/china-hackers/">Chinese hacker story</a> published in 2016 by <a href="https://en.pingwest.com/about">PingWest</a>, a Chinese media and marketing company founded in Silicon Valley in 2012 and headquartered in Beijing, which claims to &#8220;connect resources between China and the Silicon Valley.&#8221; Although this article is nine years old &#8211; and we know the technology world in China changes constantly &#8211; the Natto Team believes it remains relevant for understanding the connections between the world of Chinese hackers, the &#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/stories-of-a-chinese-hacker-from">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Chengdu: Teahouses, Hotpots, Universities and … Hackers ]]></title><description><![CDATA[Chengdu&#8217;s leisure lifestyle, education and talent resources have contributed to the city becoming a hacking hub]]></description><link>https://www.nattothoughts.com/p/chengdu-teahouses-hotpots-universities</link><guid isPermaLink="false">https://www.nattothoughts.com/p/chengdu-teahouses-hotpots-universities</guid><dc:creator><![CDATA[Natto Team]]></dc:creator><pubDate>Wed, 08 Jan 2025 17:02:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3dea698b-3dbc-4269-b0b7-d5023ee1826f_3024x3621.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the past 20 years, a variety of cyber threat intelligence (CTI) <a href="https://css.ethz.ch/en/publications/risk-and-resilience-reports/details.html?id=/f/r/o/m/from_vegas_to_chengdu_hacking_contests_b">analyses</a>  have pointed out that Sichuan Province is a &#8220;<a href="https://intrusiontruth.wordpress.com/2022/07/24/chinese-apts-interlinked-networks-and-side-hustles/">known hot spot for hacking</a>&#8221; and that <strong>Chengdu</strong>, the capital of Sichuan Province, has &#8220;<a href="https://therecord.media/chinese-military-hackers-redhotel-target-countries-across-asia-north-america-europe">become a hub for Chinese advanced persistent threat (APT) activity.</a>&#8221; From late 2023 to 2024, &#8220;Chengdu&#8221; has appeared in research and analysis reports from <a href="https://nattothoughts.substack.com/">Natto Thoughts</a> close to 200 times. The Natto Team&#8217;s &#8220;obsession&#8221; with Chengdu has led us, among the first, to identify publicly that Chinese information security company <a href="https://nattothoughts.substack.com/p/i-soon-another-company-in-the-apt41">i-SOON</a> was linked with China-based threat group <a href="https://www.justice.gov/opa/pr/seven-international-cyber-defendants-including-apt41-actors-charged-connection-computer">APT41</a> and likely worked for the state as a hacker-for-hire. Other than i-SOON, the Natto Team also discussed some Chengdu-based companies, such as Chengdu 404, the company behind APT41, the US Department of Treasury sanctioned</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ac74ed44-5158-44be-9efb-d2f2b0796840&quot;,&quot;caption&quot;:&quot;Update 12/10/2024: On December 10, 2024, the US Department of the Treasury&#8217;s Office of Foreign Assets Control (OFAC) sanctioned Sichuan Silence Information Technology company, and one of its employees, Guan Tianfeng.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Sichuan Silence Information Technology: Great Sounds are Often Inaudible &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:86550903,&quot;name&quot;:&quot;Natto Team&quot;,&quot;bio&quot;:&quot;We are a group of experts with decades of experience in geopolitical analysis and cyber threat intelligence. We do research in a variety of European and Asian languages. \n&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89cc96e8-a290-4e80-8425-e183892d1f15_500x334.webp&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-12-04T17:03:04.267Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea61eb73-143f-4fa3-980f-492c84efb975_1149x670.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://nattothoughts.substack.com/p/sichuan-silence-information-technology&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:152549107,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:9,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Natto Thoughts&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F129a6344-5848-4177-b035-86464e1bdfb7_334x334.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Sichuan Silence Information Technology company, and the rising Chengdu tech-star company <a href="https://nattothoughts.substack.com/p/sichuan-silence-information-technology">NoSugar Tech</a>. Lastly, we gave a full review of the Chengdu-based hacking competition <a href="https://nattothoughts.substack.com/p/tianfu-cup-2023-still-a-thing">Tianfu Cup 2023</a>.  Our &#8230;</p>
      <p>
          <a href="https://www.nattothoughts.com/p/chengdu-teahouses-hotpots-universities">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>