- The Strategist - https://aspistrategist.ru -

Recent Chinese cyber intrusions signal a strategic shift

Posted By on July 5, 2023 @ 11:15

On 25 May, Australia and its partners in the Five Eyes intelligence-sharing network—Canada, New Zealand, the UK and the US—made a coordinated disclosure [1] on a state-sponsored cyber hacking group dubbed ‘Volt Typhoon [1]’. The group has been detected intruding on critical infrastructure since 2021, but the nature of recent intelligence on its behaviour hints at worrying developments in the Chinese cyber establishment. While the Five Eyes’ disclosure is direct in its attribution of Volt Typhoon to the Chinese government, there are many layers that need to be peeled away to reveal the true nature, and implications, of the threat.

State-aligned or state-sponsored cyber threats emerging from China can be grouped under two broad government structures: the Ministry of State Security [2] and the Strategic Support Force [3]. The MSS is China’s peak foreign intelligence, counterintelligence and political security agency, and the SSF is the joint information warfare command of the People’s Liberation Army’s, akin to US Cyber Command. While its US counterpart focuses solely on military cyber operations, the SSF has a broader mandate covering electronic warfare, strategic military cyber operations and political warfare. The SSF was founded in 2015 as part of structural reforms to the PLA spearheaded by Chinese President Xi Jinping.

The most recent intrusion highlighted by the Five Eyes isn’t the type of espionage that is the veritable background noise of enduring competition among states. Chinese cyber operators have become notorious for intellectual property theft, but their cyber espionage activity has gradually shifted [4] to meeting other strategic imperatives, as the Volt Typhoon case shows.

Offensive cyber intrusions for specific strategic effects usually require the preplacement of technical implants and long-term access to the adversary’s network well in advance of the operation. Former White House cybersecurity adviser Chris Inglis has called [5] these implants intelligence, surveillance and reconnaissance platforms that are ‘ubiquitous, real-time and persistent’. Volt Typhoon appears to have been performing just such a preplacement operation.

The commercially available intelligence on Chinese cyber activity can be confusing. The MSS and even the SSF use the services of politically influential private contractors [6] to develop their offensive toolchains [7]. The contractors may also moonlight [8] as criminals, unabashedly using the same toolchains. This operational and infrastructural overlap means that commercial intelligence analysts end up grouping China-linked cybercrime, cyber espionage and military cyber activity into big clusters known in the industry by names such as Winnti, APT40, APT41, Barium and Hafnium. That has greatly muddied the waters.

However, it is possible to unpack these clusters. The MSS [9] and its affiliates have been spotted on global networks and linked with sophisticated political and economic espionage operations. The SSF [10], working with the five geographically aligned theatre commands of the PLA, has been mainly active in China’s near abroad. After the 2015 reforms, the theatre commands inherited the old, inertial bureaucracies of the PLA and their integration [11] into the joint information warfare command of the SSF is said to be a work in progress.

The technical reconnaissance bases [12] (previously known as bureaus), or TRBs, are the numerous detachments hailing from the legacy structures of the PLA’s signals intelligence setup. Most of them have been reorganised into the theatre commands and are responsible for various cyber missions. The TRBs rely on a mixture of bespoke toolchains and toolchains shared with contractors and the MSS. One example is ShadowPad [13], which is thought to be behind one of China’s first known prepositioning operations, RedEcho [14]. RedEcho was discovered in the Indian power grid in 2021 during the height of the Indo-China border standoff and is most likely the handiwork of a TRB under the Western Theatre Command.

A de-clustering of Chinese cyber operations undertaken for groups active in China’s near abroad and associated with the PLA was able to link intrusions to TRBs. According to this analysis, which was based on commercially available and open-source intelligence, the ‘Tonto Team [6]’ was related to Unit 65016, a TRB of the Northern Theatre Command; ‘Naikon [10]’ was linked to the Southern Theatre Command; and ‘Tick [15]’ was related to Unit 61419, which is likely a TRB directly under the SSF.

There has been some debate among the experts about how the TRBs fit into the joint command structure of the theatre commands and the SSF. However, the consensus [11] is that because the theatre commanders have managed to remain the foci in a slow-changing bureaucracy, most TRBs are more closely associated with them than with the SSF.

This is the assumption that the Volt Typhoon disclosure seems to challenge. It was undoubtedly a strategic operation and its prepositioning extends far beyond China’s near abroad. Its scope is a sign that the integration of joint information warfare forces into the PLA has matured. The military cyber elements seem to have been extricated from the stovepipes of the theatre commands and are ready to produce strategic effects extending beyond the Indo-Pacific. And the integration isn’t just militaristic but also political: the PLA is the Chinese Communist Party’s army. Strategic cyber operations are directly sanctioned [12] by the Central Military Commission and ultimately authorised by Xi.

An alternative hypothesis is that the MSS or a team of contractors were tasked with gathering intelligence to prepare for a future battlefield. The MSS and its privateers have gone beyond their remit in the past. The 2020–21 exploitation [16] of Microsoft Exchange, for example, which aggressively targeted many Western organisations, is thought to have been orchestrated [17] by a regional bureau of the MSS and so wouldn’t have gone through PLA channels to the top.

That said, the Chinese cyber apparatus also relies on decentralisation and outsourcing to maintain deniability. And while the Volt Typhoon intrusion could have been the result of private contractors’ reckless manoeuvring, such a move would have been deemed risky by the Chinese political establishment, which is keenly aware [12] of the risk of escalation in cyber operations.

The intelligence that has trickled through from the Five Eyes points to interesting doctrinal and strategic developments in the Chinese cyber establishment, especially the extent and success of its integration with the PLA. A rigorous, transparent assessment by interdisciplinary experts, aided by governments, is required to fully understand these developments and their potential consequences.



Article printed from The Strategist: https://aspistrategist.ru

URL to article: /recent-chinese-cyber-intrusions-signal-a-strategic-shift/

URLs in this post:

[1] disclosure: https://www.cyber.gov.au/about-us/alerts/prc-state-sponsored-cyber-actor-living-off-the-land-to-evade-detection

[2] Ministry of State Security: https://www.taylorfrancis.com/chapters/mono/10.4324/9780429031625-3/cyber-espionage-nigel-inkster?context=ubx&refId=02b1ae38-00e8-43ea-bb25-8e0458fc6d8d

[3] Strategic Support Force: https://www.taylorfrancis.com/chapters/mono/10.4324/9780429031625-4/military-cyber-capabilities-nigel-inkster?context=ubx&refId=3fd82870-3d0b-45e2-9b0c-18f32fa21e1f

[4] shifted: https://www.youtube.com/watch?v=mSk6I6egRD4

[5] called: https://www.jstor.org/stable/10.7864/j.ctv75d8hb.6

[6] contractors: https://www.uscc.gov/sites/default/files/2022-02/Adam_Kozy_Testimony.pdf

[7] toolchains: https://www.sentinelone.com/labs/shadowpad-a-masterpiece-of-privately-sold-malware-in-chinese-espionage/

[8] moonlight: https://www.justice.gov/opa/pr/seven-international-cyber-defendants-including-apt41-actors-charged-connection-computer

[9] MSS: https://youtu.be/mSk6I6egRD4?t=569

[10] SSF: https://www.uscc.gov/sites/default/files/2022-11/Chapter_3_Section_2--Chinas_Cyber_Capabilities.pdf

[11] integration: https://cira.exovera.com/research-analysis/china/the-pla-strategic-support-force-a-joint-force-for-information-operations/

[12] technical reconnaissance bases: https://www.uscc.gov/sites/default/files/2022-02/John_Chen_Testimony.pdf

[13] ShadowPad: https://www.secureworks.com/research/shadowpad-malware-analysis

[14] RedEcho: https://www.recordedfuture.com/redecho-targeting-indian-power-sector

[15] Tick: https://therecord.media/japanese-police-say-tick-apt-is-linked-to-chinese-military/

[16] exploitation: https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-258a

[17] orchestrated: https://zetter.substack.com/p/unmasking-chinas-state-hackers-f7c

Copyright © 2024 The Strategist. All rights reserved.