Off the Record: Demystifying the Chinese Threat Landscape
See Intelligence-Led Security In Action Attend a Live Product Demo

Off the Record:
Demystifying the Chinese Threat Landscape

Charged with demystifying the Chinese threat landscape, Recorded Future’s Insikt Group, the company’s research division, leverages deep government, law enforcement, military, and intelligence expertise to bring these insights to light in our Off The Record series, Demystifying the Chinese Threat Landscape.

About This Series

One of the most active nations in cyberspace, China uses the internet to achieve national security, economic, and strategic geopolitical objectives. Understanding how Beijing uses its cyber capabilities to achieve these ends, as well as the idiosyncrasies of the Chinese landscape, is critical for security practitioners, leaders, and policymakers to effectively defend their organizations. Charged with demystifying the Chinese threat landscape, Recorded Future’s Insikt Group, the company’s research division, leverages deep government, law enforcement, military, and intelligence expertise to bring these insights to light.

Adam Janofsky, editorial director of The Record by Recorded Future, will host this exclusive series of interviews August 2-5 at 11AM ET with Insikt Group’s expert threat analysts focused on China’s cyber activities.

Adam Janofsky

Adam Janofsky
Editorial Director of The Record

Adam previously was the cybersecurity and privacy reporter for Protocol, and prior to that covered cybersecurity, AI, and other emerging technology for The Wall Street Journal.

Takeaways

This Off the Record series will surface insights including:

  • An understanding of the strategy and motivations behind China’s cyber espionage and targeted intrusion campaigns
  • Details into the inner workings and structure of China’s internal intelligence structure and hierarchy
  • A look underground into China’s dark web and its commonly used tools, tactics, and procedures (TTPs) and how its cybercrime ecosystem operates differently than in other countries

Tip of the Iceberg: Mapping the Threat Landscape from China

Devin Thorne, Threat Intelligence Analyst, Insikt Group
Monday, August 2 11:00 AM ET

The Chinese government fields a complex web of organizations and systems that facilitate forms of espionage, influence, and coercion, both online and offline. From human source and cyber-enabled intelligence collection, to online information influence operations, to military thinking on cyber warfare, threat intelligence analyst Devin Thorne maps out what we know about the actors behind these activities and their methods.

The Digital Silk Road: How Beijing Embeds Itself in Foreign Infrastructure

Charity Wright, Expert Threat Intelligence Analyst, Insikt Group
Tuesday, August 3 11:00 AM ET

One of China’s long-term ambitions is to be the world’s leading cyber superpower. In this session, cyber threat intelligence analyst Charity Wright describes Beijing’s roadmap to achieving its goal, which relies on building extensive and intrusive digital infrastructure in developing nations.

A Look at China’s Sprawling Cyber Espionage Campaigns

Jon Condra, Director, Strategic and Persistent Threats, Insikt Group
Wednesday, August 4 11:00 AM ET

Insikt Group researchers uncovered evidence earlier this year that links several multi-year cyber espionage campaigns to a Chinese military unit operating out of the city of Ürümqi in China’s western province of Xinjiang. Jon Condra, who leads the Strategic and Persistent Threats team at Recorded Future, explains how the People’s Liberation Army Unit 69010 has been targeting defense-related organizations in Afghanistan, India, Kazakhstan, Kyrgyzstan, Pakistan, Tajikistan, and Uzbekistan since at least 2014.

Strolling Through China’s Dark Web Marketplaces

Di Wu, Senior Threat Intelligence Analyst, Insikt Group
Thursday, August 5 11:00 AM ET

Beijing has a tight grip on how its citizens access the internet, but that hasn’t stopped a small number of underground Chinese marketplaces from offering tools, services, and stolen data to cybercriminals. Senior threat intelligence analyst Di Wu describes the similarities and differences between these marketplaces and ones that cater to cybercriminals in other countries.