Chinese Cybercrime in Neighboring Countries

Chinese Cybercrime in Neighboring Countries

insikt-logo-blog.png
Editor’s Note: The following post is an excerpt of a full report. To read the entire analysis, click here to download the report as a PDF.

This report examines cybercrimes perpetrated by Chinese-speaking threat actors in countries neighboring China over the last year. In particular, it pertains to the theft and sale of personally identifiable information (PII), cross-border gambling and money laundering, e-commerce and online romance scams, and possible advanced persistent threat (APT) actors engaging in cybercrime. This report, which used the Recorded Future® Platform, the dark web, and open sources, will be of interest to researchers of cybercrime and the region’s geopolitics.

Executive Summary

As China continues to tighten its control of the internet and crackdown on cybercrime by using methods such as internet cleanup campaigns, the banning of cross-border gambling, the tightening of anti-money laundering laws, increased pornography censorship, and the banning of cryptocurrency trading, cybercrime has been driven to many of its neighboring countries where such laws and regulations are more limited and there is less government surveillance. Furthermore, economic hardship due to a slowing economy and extremely strict COVID-19 lockdowns have forced more people to engage in scams and cybercrime to pay their bills, including traveling across borders to engage in criminality.

Given the geographical proximity, language and cultural similarities, and lack of laws and regulations, some border regions such as the Wa State of Myanmar have become fertile grounds for Chinese cybercrime. Sophisticated cybercrime syndicates have developed online romance scams through social engineering for the purposes of stealing cryptocurrency and blackmailing victims. In addition, many neighboring countries have long been targets of Chinese APT groups. Armed with technical skills and attack infrastructure, some of these APT actors take up cybercrime to supplement their regular income, and some of the obtained data and access that appear to be APT exploits are advertised on Chinese-language dark web marketplaces.

Key Findings

Threat Analysis

This report is based on a year-long investigation — from May 2021 to May 2022 — of a number of Chinese-speaking threat actors offering to sell compromised PII, corporate records, and other stolen items on Chinese-language dark web marketplaces. The results of that investigation, along with analysis of Recorded Future’s data sets and knowledge of crime-related activities being conducted by Chinese-speaking threat actors, revealed the most common types of cybercrime conducted by Chinese-speaking cybercriminals, both on the dark web and publicly accessible sites, specifically in countries neighboring China:

The report also presents evidence of connections between Chinese APT and cybercriminal activities in neighboring countries based on both industry reporting and data from the Recorded Future Platform.

Editor’s Note: The following post is an excerpt of a full report. To read the entire analysis, click here to download the report as a PDF.