Skip to content Skip to footer
0 items - $0.00 0

An inside look at NSA tactics, techniques and procedures from China’s lens by davikr

An inside look at NSA tactics, techniques and procedures from China’s lens by davikr

An inside look at NSA tactics, techniques and procedures from China’s lens by davikr

10 Comments

  • Post Author
    themark
    Posted February 19, 2025 at 6:56 pm

    It seems like the lack of operations during US holidays would be a big oversight.

  • Post Author
    vednig
    Posted February 19, 2025 at 6:57 pm

    can I comment freely here

  • Post Author
    rdtsc
    Posted February 19, 2025 at 7:03 pm

    > No attacks occurred during Memorial Day and Independence Day holidays which were unique American holidays.

    Simple but effective. A good non-NSA agency should also learn from this to be able to effectively false-flag as NSA, as long as they are flexible enough to allow off-hours and overtime pay and remember to respect the US federal holidays.

    > Two zero-days were used to breach any company with SunOS-exposed systems in neighbouring countries to China

    SunOS? Wonder if it's because it's genuinely used still quite a bit or they simply had zero-days for it since many of those are old and unpatched?

  • Post Author
    markus_zhang
    Posted February 19, 2025 at 7:13 pm

    This is really interesting. I wonder how red-teams in State sponsored teams operate in real life. I guess every one has an NDA, but would love to get a general idea.

    I assume it's a jungle out there, so teams need to protect themselves 24/7/365 and I'm surprised to find no activities in holidays.

  • Post Author
    breppp
    Posted February 19, 2025 at 7:19 pm

    It seems like the most efficient way of detecting NSA tools is a regular expression of two all caps dictionary words

  • Post Author
    motohagiography
    Posted February 19, 2025 at 7:19 pm

    glad to see the same basic tradecraft from 90s hacking, only very refined and industrialized. it's a durable skill. the focus on switches and routers is very pro, as they are the most opaque infra with the fewest forensic capabilities. iot is less reliable as RE'ing cheap devices and firmware for IoCs is accessible, where almost nobody outside the IC did core gear (word to phenolit from back in the day tho).

    the traffic redirection is interesting in that i would be curious if they rate limited it or used on device selectors in their implant to redirect traffic. the trade off between memory caching packets to sort on selectors vs.stealthy throughput would have been a fun design meeting.

    hunting these kinds of actors would be supremely fun. the main thing that protects them is few outside massive bureaucracies really care enough or find it economical, as the rewards are more in finding new zero day and not hunting state level threat actors. the exceptions who do (p0, citizenlab etc) are attached to massive orgs and dont really led themselves to privateering. amazing write up anyway.

  • Post Author
    thaumasiotes
    Posted February 19, 2025 at 7:48 pm

    > These insights stem from extensive research I did on Weixin

    Someone doing extensive research on Weixin might ordinarily realize that it's called "Wechat" in English.

  • Post Author
    kridsdale1
    Posted February 19, 2025 at 8:29 pm

    I love the Windows 98 clip art.

  • Post Author
    alphalite
    Posted February 19, 2025 at 8:55 pm

    I originally came here to comment how crazy it seems that DoD employees at NSA cannot be bothered to cover their tracks by working nonstandard hours/holidays (obviously Mil & Intel folks do this, they even get deployed!). But the thought occurred to me that attribution to NSA was likely a desired outcome here (“We can hack you too”) and there are probably many people at NSA working nonstandard hours/days to prevent attribution.

    I think the English language aspect is much more interesting and difficult/impossible to prevent.

  • Post Author
    quanto
    Posted February 19, 2025 at 9:05 pm

    > Chinese cyber organizations openly acknowledge and publicize their partnerships. This openness was particularly interesting to observe and may be influenced by cultural factors, such as the Confucian emphasis on shared knowledge and a political framework that encourages collective efforts.

    I or anyone outside obviously cannot verify the technical details. However, the above statement struck as particularly uninformed. As any engineer in East Asia can tell you, there is nothing especially collaborative about tech in Confucian culture; if anything, the engineers in that region admire the free speech and discussion traditionally prized in the Western culture. Calling Chinese political framework, especially in the context of national security, conducive to open public discussion was quite ironic to see.

    source: I regularly work with engineers from that culture.

Leave a comment

In the Shadows of Innovation”

© 2025 HackTech.info. All Rights Reserved.

Sign Up to Our Newsletter

Be the first to know the latest updates

Whoops, you're not connected to Mailchimp. You need to enter a valid Mailchimp API key.