Security researcher Mei Wandowski discusses the iSoon leaks, revealing China's state-sponsored hacking-for-hire operations. They explore the evolution of cyber espionage to a corporate model, connections to ABT41, CEO firings, and unethical business practices. They also touch on 2024 cyber threat trends and the complexities of cyber threat groups.
32:44
AI Summary
AI Chapters
Episode notes
auto_awesome
Podcast summary created with Snipd AI
Quick takeaways
ISUN operates like a typical corporate entity, with client entertainment and competitive bidding tactics.
Leaked documents reveal ISUN's extensive services including DDoS attacks, social media monitoring, and surveillance database provision.
Deep dives
ISUN Leaks Reveals Corporate Culture and State-Sponsored Hacking
A recent leak from ISUN sheds light on a corporate culture mirroring common office dynamics. Internal messages and files disclose dealings in urgent deadlines, client entertainment, proposals, and state-sponsored hacking for 14 governments. The leak provides insights into their software and network technology services, including custom hardware, snooping devices, and software exploits. The unprecedented peek into a Chinese state-sponsored hacking network showcases the shift towards corporate structures in state-backed cyber operations.
ISUN's Services and Inner Workings Unveiled Through Leaks
ISUN's leaked documents outline services beyond their official description, such as DDoS attacks and social media monitoring tools. The firm's offerings extend to providing government clients with databases for surveillance purposes. Internally, the leak exposes the company's operational strategies, including courting government officials for contracts through networking, late-night outings, and competitive bidding tactics.
Ecosystem of Hacking Companies and State-Sponsored Operations
The interconnected web of companies like ISUN, Chengdu 404, and APT 41 showcases a complex ecosystem within China's hacking industry. The leaks highlight the blurred lines between corporate entities bidding on state contracts and state-sponsored cyber activities. Legal implications remain murky as these companies operate under the premise of serving government directives, leading to challenges in regulating their activities and addressing cybersecurity risks on a global scale.
A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks.