SlideShare a Scribd company logo
Che Chang Silvia Yeh
From Parroting to Echoing:
The Evolution of
China’s Bots-Driven InfoOps
targeting Taiwan
Che Chang
Senior Cyber Threat Analyst @TeamT5
Research interests
Chinese cybercrime underground market and Information
Operation
Speaking Engagement
Black Hat Asia, HITCON Pacific, Code Blue, SANS CTI
Summit, 2020 vGCTF Workshop and Cybersec in Taiwan.
Silvia Yeh
Cyber Threat Analyst @TeamT5
Research interests
APTs and InfoOps in APAC region
Speaking Engagement
Black Hat Asia, CODE BLUE, SANS CTI Summit, CyberSec, HITCON
Pacific, etc.
Outline
• Intro: China-nexus Bot Networks
• From “Parroting” to “Echoing”
• Case Study: Operation ChinaRoot
• Outlook and Conclusion
Our Methodology
• CTI Mindset
• Actor
• Attribution
• TTPs
• Diamond Model

Recommended for you

Gūžas locītavas pataloģijas un saslimšanas
Gūžas locītavas pataloģijas un saslimšanasGūžas locītavas pataloģijas un saslimšanas
Gūžas locītavas pataloģijas un saslimšanas
IBM System x3550 M2 Product Guide
IBM System x3550 M2 Product GuideIBM System x3550 M2 Product Guide
IBM System x3550 M2 Product Guide

The document summarizes an IBM System x3550 M2 server. It is a 1U dual-socket rack server that provides highly available, energy efficient computing power for applications requiring physical or virtual intensive workloads. It features Intel Xeon 5500 series processors, up to 128GB of memory, hot-swap hard drives and solid state drives, redundant power and fans, and management tools for high availability at a lower cost of ownership compared to other servers. The high density and energy efficiency of the 1U design allows for many servers to be installed in a single rack to support large workloads.

system xsystemxibm center white papers
орнитоз
орнитозорнитоз
орнитоз

Орнитоз

Intro: China-nexus
Bot Networks
Previous Observation
• Limited influence, no organic engagement
• Mechanical parroting of Chinese state media
• Operations remain persistent for years
• New bots are spawned within a short period of time
• Notable case: Spamouflage network
Mechanical
parroting of
Chinese state
media
- Caption +
meme
- Limited
influence,
no organic
engagement

Recommended for you

требования по иб фстэк (госис, пдн, асу тп) V.1.1
требования по иб фстэк (госис, пдн, асу тп) V.1.1требования по иб фстэк (госис, пдн, асу тп) V.1.1
требования по иб фстэк (госис, пдн, асу тп) V.1.1
Приказ21Приказ17Приказ31
Архітектура арабо-мусульманського регіону
Архітектура арабо-мусульманського регіонуАрхітектура арабо-мусульманського регіону
Архітектура арабо-мусульманського регіону

Архітектура арабо-мусульманського регіону

Sepse. SIRS. MODS.
Sepse. SIRS. MODS.Sepse. SIRS. MODS.
Sepse. SIRS. MODS.

Sepse. SIRS. MODS.

[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh  and Che Chang
From “Parroting”
to “Echoing”
Nuanced Changes in TTPs (1):
Hijacking pro-democracy narratives
• Blogs/forums → mainstream social media
platforms
• Create a false appearance that the content is
being echoed across the cyberspace
• Victims
• Milk Tea Alliance
(Online democracy and human rights movement)
• Intrusion Truth
(Anonymous group)
• Safeguard Defenders
(pan-Asian human rights NGO)
Hijacked Identity Trigger Point/Motivation Amplified
Narrative
Date
Milk Tea Alliance Unknown Covid-19 origin conspiracy
theory (Fort Detrick)
2022 FEB – 2022 MAY
Safeguard Defenders Published a report on Chinese
transnational policing
Pro-Chinese police content 2022 SEP – 2022 OCT
Intrusion Truth 1. Intrusion Truth published an
article on APT41
2. Following accusations of NSA’s
attack against Northwestern
Polytechnical University
- APT41 is funded by the U.S.
government
- APT41 is operated by NSA
TAO
2022 JUL - Ongoing
Nuanced Changes in TTPs (1):
Hijacking pro-democracy narratives

Recommended for you

Возможности МР исследований в гинекологической практике
Возможности МР исследований в гинекологической практикеВозможности МР исследований в гинекологической практике
Возможности МР исследований в гинекологической практике
СЛР у XXI сторіччі
СЛР у XXI сторіччіСЛР у XXI сторіччі
СЛР у XXI сторіччі

Серцево-легенева реанімація: гайдлайни Європейської Ради Ресусцітації 2015 року.

хвороби сухожилків і сухож піхв
хвороби сухожилків і сухож піхвхвороби сухожилків і сухож піхв
хвороби сухожилків і сухож піхв

хвороби сухожилків і сухож піхв

kaskus.co.id ID
ameblo.jp JP
vk.com RU
dnyhr.com ASEAN
nanyangmoney.com VN/SG/MY
mhwmm.com MM
xiaoxq.net NAM
careerengine.us NAM
6parkbbs.com NAM
nairaland.com NG
hswh.org.cn CN
teamilk951.tumblr.com
teamilk115.livejournal.com
• Famous “Fort Detrick” conspiracy theory
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh  and Che Chang
• Shared infra
• Narrative overlap:
• Taiwan
• Xinjiang
• Journalist
• Lynas Rare Earths
(Operation
DragonBridge)
• Guo Wengui

Recommended for you

Лекція Дифтерія Менінгококова.pptx
Лекція  Дифтерія Менінгококова.pptxЛекція  Дифтерія Менінгококова.pptx
Лекція Дифтерія Менінгококова.pptx

Медсестринство в педіатрії

General knowledge bangladesh affairs (xclusive short technique)
General knowledge  bangladesh affairs (xclusive short technique)General knowledge  bangladesh affairs (xclusive short technique)
General knowledge bangladesh affairs (xclusive short technique)
general knowledge (bangladesh affairs)
Патоморфологія хвороб. лекція 2.
Патоморфологія хвороб. лекція 2.Патоморфологія хвороб. лекція 2.
Патоморфологія хвороб. лекція 2.

Зміст: 1. Загальна характеристика патоморфологічних змін при інфекційних хворобах. 2. Патогенез та патоморфологічні зміни при сибірці. 3. Характеристика клостридіозів 3.1 Емфізематозний карбункул 3.2 Злоякісний набряк 3.3 Брадзот овець 3.4 Інфекційна ентеротоксемія овець 3.5 Анаеробна дизентерія новонароджених

anthraxgangraena emphysematosaoedema malignum
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh  and Che Chang
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh  and Che Chang
Shared infra
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh  and Che Chang

Recommended for you

HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf

Charles Mok looks at the impacts of emerging technologies like artificial intelligence, blockchain, and the metaverse. He discusses both benefits and concerns, such as privacy issues with facial recognition, mounting ethical concerns with the industrialization of AI, and debates around decentralization. He also examines implications of the Ukraine conflict, including hacker activity and big tech's response, as well as what the future internet may look like in regards to issues like social credit, censorship, and online freedom.

technologyinformation technologytech for good asia
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and Applications

Opening talk at Singapore Symposium on Sentiment Analysis (S3A), February 6, 2015, Singapore. http://s3a.sentic.net/#s3a2015 Abstract With the rapid rise in the popularity of social media, and near ubiquitous mobile access, the sharing of observations and opinions has become common-place. This has given us an unprecedented access to the pulse of a populace and the ability to perform analytics on social data to support a variety of socially intelligent applications -- be it for brand tracking and management, crisis coordination, organizing revolutions or promoting social development in underdeveloped and developing countries. I will review: 1) understanding and analysis of informal text, esp. microblogs (e.g., issues of cultural entity extraction and role of semantic/background knowledge enhanced techniques), and 2) how we built Twitris, a comprehensive social media analytics (social intelligence) platform. I will describe the analysis capabilities along three dimensions: spatio-temporal-thematic, people-content-network, and sentiment-emption-intent. I will couple technical insights with identification of computational techniques and real-world examples using live demos of Twitris (http://twitris2.knoesis.org).

citizen sensingtwitrissocial data for social good
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh  and Che Chang
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh  and Che Chang
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh  and Che Chang
Nuanced Changes in TTPs (2):
From “Parroting” to “Echoing”
• Local forums → social media platforms → local
forums
• Create a false appearance that the content is
being echoed across the cyberspace
• Online communities of different purposes
(lifestyle, politics, local community, pets,
cryptocurrency, live streaming, marketplace)

Recommended for you

The language of social media
The language of social mediaThe language of social media
The language of social media

The document discusses social media analysis and summarizes key findings from analyzing tweets related to UK politicians. It finds that abuse towards politicians on Twitter was more common in 2017 than 2015, and that a small number of prominent MPs received most abuse in 2015. While men received more abuse than women in 2015, the targets of abuse changed in the 2017 analysis.

social media analysistext analysistwitter
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats

The document discusses several real-world advanced persistent threat (APT) attacks throughout history, including the first known cyber espionage incident called "The Cuckoo's Egg" in 1986, the Stuxnet cyber weapon used against Iran's nuclear facilities in 2010, and Operation Aurora which targeted major corporations like Google and Adobe in 2009. It defines APTs as targeted, advanced, persistent attacks usually carried out by well-funded nation-state groups, and outlines the common goals, phases, actors, and challenges of attributing APTs. The document concludes by providing further resources on APT reports, frameworks, and demonstrating attack techniques using Metasploit and Armitage.

apt
We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014

This document discusses cyber operations carried out by the Syrian government from 2011 to present to target dissidents and opposition groups. It describes campaigns including fake YouTube and Facebook sites, Skype phishing, and use of remote access trojans to deliver malware. Specific groups involved are identified as the "alosh66" gang, known for predictable domain names and using Dark Comet and BlackShades RATs, and the "dot28" gang, leveraging the IP address 216.6.0.28 as a command and control server and using Dark Comet and Xtreme RATs. Cyber operations from Ethiopia and Vietnam targeting dissidents are also briefly mentioned.

Operation ChinaRoot (マツホド)
Operation ChinaRoot (茯苓有點兒甜)
• 茯苓 (マツホド)
• Over 200 fan pages and bot accounts identified
• Botnets overlapped in DRAGONBRIDGE and Spamouflage
• Status: ongoing since mid-2021
• Target: Taiwanese online users
• Aim: Attack Taiwanese pro-independence
politicians
• Platforms: Taiwan’s local forums
• (卡提諾論壇 Ck101, BabyHome, etc.)
Source: Taiwan Ministry of Justice Investigation Bureau (MJIB)
Operation ChinaRoot: Key Narratives
Defeatism
• “PLA is ready to attack Taiwan, Tsai Ing-wen
has escaped,”
Attack pro-democracy U.S. politicians
• “Pelosi’s trip to Taiwan is for financial gain,”
Attack Taiwanese government policies
• “Taiwanese government covered up Covid-
19 death cases,”
• “Taiwan’s Covid measures caused
widespread death among children,”
• “Taiwan’s own Vaccine is causing people
dead.”
Multi-Layer Amplification

Recommended for you

Lecture Chinese media
Lecture   Chinese mediaLecture   Chinese media
Lecture Chinese media

The lecture provides an overview of the transformations of Chinese media from the early years of the PRC to the most recent development. Specifically, it pays attention to the changing market conditions and state policies in China. #China #mediaindustry #digitalcontent #GoingOut The lecture was delivered in April 2018 at Monash University

chinamedia industrymedia policy
Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24

Presented at the International Communication Association Preconference, New Media and Citizenship in Asia: Social Media, Politics, and Community-Building on May 24, 2012, Phoenix, AZ, USA

minoritiesinternetcitizenship
Introduction to Hacktivism
Introduction to HacktivismIntroduction to Hacktivism
Introduction to Hacktivism

This document discusses digital activism and hacktivism. It defines digital activism as using technology over large distances to effect political or social change through grassroots campaigns. Hacktivism is separated from digital activism by involving computer crimes like unauthorized access or impairment of computer systems. Early examples of hacktivism included attacks in 1989 promoting anti-nuclear messages. Anonymous emerged in the 2000s and became politicized through protests around Scientology in 2008. Major hacktivist operations since then have included Payback targeting copyright enforcement and Darknet targeting child pornography sites. Lessons from these events have led to guidance for underground communities on operational security.

hacktivismdigital activismactivism
①
②
③
④
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh  and Che Chang
Narrative
during
Pelosi’s visit
to Taiwan
Narrative during Pelosi’s visit to Taiwan

Recommended for you

[打造創業生態體系] 02 如何跟上矽谷產品趨勢
[打造創業生態體系] 02 如何跟上矽谷產品趨勢[打造創業生態體系] 02 如何跟上矽谷產品趨勢
[打造創業生態體系] 02 如何跟上矽谷產品趨勢

講者簡介: Intel perceptual computing 研究員 李佳勳(Jackie) 美國麻省理工學院Media Lab 博士 。大學時期,打破舊有設計思維,以24項作品與自行研發產品獲得MIT全額獎學金。於2008年發明「情人杯」而聲名大噪,琉璃工坊後續協助將其產品化。曾舉辦夜市工作坊,與年輕學子一起腦力激盪,尋找夜市文化中的創意與設計靈感,希望以科技傳達台灣記趣,重新找回台灣文化精神並期許將台灣學生的創造力遞向國際舞台。 影音實錄可參考:http://goo.gl/9829W5

The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)

Keynote address for the National Conference of State Legislatures (NCSL) Luncheon for Legislative Information and Communications Staff and National Association of Legislative Information Technology professionals on October 10, 2012.

national conference of state legislaturessocial media and governmentinformation technology
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...

Trump, Brexit, Cambridge Analytica... In the last few years, we have had to confront the consequences of the use and misuse of data science algorithms in manipulating public opinion through social media. The use of private data to microtarget individuals is a daily practice (and a trillion-dollar industry), which has serious side-effects when the selling product is your political ideology. How can we cope with this new scenario?

#datanatives#dataanalytics#datascience
Outlook
and
Conclusion
Strategic Overview: Overt Operation
• China’s overt operations are always there during every major political
event:
• Hong Kong pro-democracy protest in 2019
• Taiwan’s major elections
• COVID outbreaks
• Ukraine war
• More collaboration between Chinese and Russian state media outlets
and propaganda machine
• China’s propaganda machine was amplifying Russia’s disinformation during
the Ukraine invasion
Strategic Overview: Covert Operation
• Operation ChinaRoot
• Bot networks may be a shared asset among Chinese nation-state
actors
• Bot accounts repeatedly deployed in different influence campaigns
• Guo Wengui, Xinjiang, Hong Kong, US Covid policies, Taiwan, Ukraine
Future Outlook
• Social media platforms: critical battlefields for threat actors to launch
InfoOps
• China’s Overt InfoOp will be more sophisticated.
• China’s Covert InfoOp will be more advanced.
• Political events are the key driver for InfoOp campaigns.
• Mobilization of online netizens
• Doxxing: Create harassment against journalists
• Protest: Incite protests in the physical world
• Strategic Distraction: Breed cynicism, distrust, and defeatism

Recommended for you

Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...

Presentation at Concordia University October 2018 Dr Alexia Maddox, Lecturer in Communications, School of Communication and Creative Arts, Deakin University. Email: a.maddox@deakin.edu.au Keywords: Social media analysis; twitter; cryptocurrencies; social disruption; digital trace data. Abstract Cryptocurrencies represent emerging financial technologies engendered through overlapping community values of decentralised peer-to-peer exchange, encryption technologies and an overarching agenda towards the disruption of centralised banking within the fiat economy. This paper will trace the development and shifts in public discourse within social media surrounding cryptocurrencies. The last five years have seen cryptocurrencies move from technological emergence to a broadening range of applications and history potholed with disputes, divergence, hacks and scams within the community. The accompanying influence of speculation has shifted the focus from social adoption to value volatility and seen the incorporation of associated technologies within banking and other organisational processes. The emphasis within public discourse has also followed a shift from bitcoin to blockchain. The study is grounded through a Twitter analysis of cryptocurrency-related social media discourse within the Australian context. The social media analysis works with social media archives of the Australian Twittersphere captured between early 2012 to May 2017. Access to this curated archive is through TrISMA and the timeframe under analysis aligns with the most detailed available dataset. The analysis seeks to characterise the emergence of public dialogue surrounding cryptocurrency use and application over time, focusing on peak engagement events. The key concepts directing the focus and interpretation of the social media analysis include financial inclusion, socio-technical disruption and social change. The whimsical quest of the study is to learn where the digital frontier has shifted to within this community and point to possible future developments. From a community studies perspective the case study represents an initial foray into data analytics to explore whether it is possible to detect the shifting shape and form of digital community through its environmental imprint (Maddox 2016). This methodological aspect of the work speaks to an attempt to generate a data recognition practice that can be deployed to search for signatures of social disruption within digital trace data. Bio: Alexia Maddox is a digital sociologist with research interests are community studies, research methods and digital frontiers. Here recent book, Research Methods and Global Online Communities: a case study with Routledge, combines these areas and forms the basis of her study of emerging communities forming through the internet and cryptography.

cryptocurrenciesbitcoinsocial media analysis
Stamford innovation week - blockchain day
Stamford innovation week - blockchain dayStamford innovation week - blockchain day
Stamford innovation week - blockchain day

The document provides an overview of cryptocurrency and its role in enabling free speech over the past 10 years. It discusses how in the early years, cryptocurrency was mainly used on darknet markets like Silk Road, but more recently it has provided an alternative payment rail for those who have been deplatformed by major corporations for their political views. The document argues that increased political polarization will likely continue this trend of cryptocurrency enabling free expression for those who have been denied other services. It maintains that until around 2017-2018, there was no real need for the average person to use cryptocurrency except in situations of capital controls or hyperinflation, but that has begun to change as more individuals and groups face censorship and denial of services from

bitcoinblockchainmarmots
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy

Last i t talk. L t minute t lk about underground economy and cybercrime. The speaker discussed the evolution of hacking from curiosity to money motivated crimes and the rise of underground economies that facilitate cybercrimes like identity theft and banking fraud.

securityundergroundhacking
Future Outlook (cont.)
• We have seen the covert InfoOp in the times of crises.
• Especially in times of war and elections
• People on social media will be targeted and exploited by
authoritarianism government in major political events
• Threat actors react rapidly to current affairs
• Upcoming events
• 2022 Taiwanese local elections
• 2022 U.S. midterm elections
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh  and Che Chang
Mitigation
• To mitigate InfoOp on social media needs all stakeholders.
Public Sector
#Cyber Governance
#Law enforcement
#Foreign interference
Civil Society
#Fact Checking
#Media literacy
Global Firms
#Platform Support
#Technical Support
Mitigation (For the Law and Policy Track)
1. Review international and domestic laws
2. Start from human Security
3. Build understanding of technology
4. Maintain the collaborative Mechanisms
*An approach of cyber threat intelligence
CTI approach can provide a better understanding of the threat
landscape by connecting dots, hunting down actors, and swiftly detecting
suspicious accounts during the early stage
• Swift detection of malicious narrative
• Detect and Flag the amplifiers and their botnets
• Immediate removal and blockage before viral

Recommended for you

Hack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - introHack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - intro

This document outlines an agenda for a meetup of the Hack Democracy SF group. It thanks presenters and attendees. It discusses the meaning of the term "hacker" and how hackers can work with public institutions to define the future of democracy. The agenda lists 5 presentations on projects using technology to increase transparency and civic participation, including Code for America, Circle Voting, ScraperWiki, VoteReports.org, and ShortStack. It notes the format will be 5-minute presentations plus Q&A and discusses plans to expand the group to other cities.

hackdemocracysfhackdemocracyhackers
East of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great FirewallEast of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great Firewall

This document provides an overview of internet regulation and censorship in China. It discusses how the Chinese government controls and monitors the internet through mechanisms like the Great Firewall and by requiring service providers to comply with censorship directives. It also notes that censorship aims to control media, prohibit mass organization, protect senior leaders from scrutiny, and protect domestic markets. The document then gives examples of some major Chinese internet companies and platforms and provides sources for further information.

webregulationchina
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation

Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation Talk at Rikkyo University, Tokyo Apr 3 2023

digital authoritarianismdigital repressiontechno-geopolitics
Welcome to visit our booth!
TeamT5は日本人セキュリティアナリスト募集中です。
興味がある方は当社ブースにお立ち寄り下さい。
Thank You.

More Related Content

What's hot

Dusevni zdravi zamestnancu
Dusevni zdravi zamestnancuDusevni zdravi zamestnancu
Dusevni zdravi zamestnancu
Petr Hovorka
 
Labdabīgs paroksizmāls pozicionāls vertigo (LPPV)
Labdabīgs paroksizmāls pozicionāls vertigo (LPPV)Labdabīgs paroksizmāls pozicionāls vertigo (LPPV)
Labdabīgs paroksizmāls pozicionāls vertigo (LPPV)
Alise Adoviča
 
2020 буклет 1.pdf
2020 буклет 1.pdf2020 буклет 1.pdf
2020 буклет 1.pdf
taras039
 
Gūžas locītavas pataloģijas un saslimšanas
Gūžas locītavas pataloģijas un saslimšanasGūžas locītavas pataloģijas un saslimšanas
Gūžas locītavas pataloģijas un saslimšanas
traumortoppulcins
 
IBM System x3550 M2 Product Guide
IBM System x3550 M2 Product GuideIBM System x3550 M2 Product Guide
IBM System x3550 M2 Product Guide
IBM India Smarter Computing
 
орнитоз
орнитозорнитоз
орнитоз
cdo_presentation
 
Архітектура арабо-мусульманського регіону
Архітектура арабо-мусульманського регіонуАрхітектура арабо-мусульманського регіону
Архітектура арабо-мусульманського регіону
ssuser1442b6
 
Sepse. SIRS. MODS.
Sepse. SIRS. MODS.Sepse. SIRS. MODS.
Sepse. SIRS. MODS.
Anna Rudaja
 
Возможности МР исследований в гинекологической практике
Возможности МР исследований в гинекологической практикеВозможности МР исследований в гинекологической практике
Возможности МР исследований в гинекологической практике
tomograph_dp_ua
 
СЛР у XXI сторіччі
СЛР у XXI сторіччіСЛР у XXI сторіччі
СЛР у XXI сторіччі
Ulbolhan Fesenko
 
хвороби сухожилків і сухож піхв
хвороби сухожилків і сухож піхвхвороби сухожилків і сухож піхв
хвороби сухожилків і сухож піхв
demon4ik demon4ik
 
Лекція Дифтерія Менінгококова.pptx
Лекція  Дифтерія Менінгококова.pptxЛекція  Дифтерія Менінгококова.pptx
Лекція Дифтерія Менінгококова.pptx
Tetianaitova
 
Патоморфологія хвороб. лекція 2.
Патоморфологія хвороб. лекція 2.Патоморфологія хвороб. лекція 2.
Патоморфологія хвороб. лекція 2.
microsvit
 

What's hot (16)

Dusevni zdravi zamestnancu
Dusevni zdravi zamestnancuDusevni zdravi zamestnancu
Dusevni zdravi zamestnancu
 
Labdabīgs paroksizmāls pozicionāls vertigo (LPPV)
Labdabīgs paroksizmāls pozicionāls vertigo (LPPV)Labdabīgs paroksizmāls pozicionāls vertigo (LPPV)
Labdabīgs paroksizmāls pozicionāls vertigo (LPPV)
 
2020 буклет 1.pdf
2020 буклет 1.pdf2020 буклет 1.pdf
2020 буклет 1.pdf
 
Gūžas locītavas pataloģijas un saslimšanas
Gūžas locītavas pataloģijas un saslimšanasGūžas locītavas pataloģijas un saslimšanas
Gūžas locītavas pataloģijas un saslimšanas
 
IBM System x3550 M2 Product Guide
IBM System x3550 M2 Product GuideIBM System x3550 M2 Product Guide
IBM System x3550 M2 Product Guide
 
орнитоз
орнитозорнитоз
орнитоз
 
требования по иб фстэк (госис, пдн, асу тп) V.1.1
требования по иб фстэк (госис, пдн, асу тп) V.1.1требования по иб фстэк (госис, пдн, асу тп) V.1.1
требования по иб фстэк (госис, пдн, асу тп) V.1.1
 
Архітектура арабо-мусульманського регіону
Архітектура арабо-мусульманського регіонуАрхітектура арабо-мусульманського регіону
Архітектура арабо-мусульманського регіону
 
Sepse. SIRS. MODS.
Sepse. SIRS. MODS.Sepse. SIRS. MODS.
Sepse. SIRS. MODS.
 
Возможности МР исследований в гинекологической практике
Возможности МР исследований в гинекологической практикеВозможности МР исследований в гинекологической практике
Возможности МР исследований в гинекологической практике
 
СЛР у XXI сторіччі
СЛР у XXI сторіччіСЛР у XXI сторіччі
СЛР у XXI сторіччі
 
хвороби сухожилків і сухож піхв
хвороби сухожилків і сухож піхвхвороби сухожилків і сухож піхв
хвороби сухожилків і сухож піхв
 
Лекція Дифтерія Менінгококова.pptx
Лекція  Дифтерія Менінгококова.pptxЛекція  Дифтерія Менінгококова.pptx
Лекція Дифтерія Менінгококова.pptx
 
General knowledge bangladesh affairs (xclusive short technique)
General knowledge  bangladesh affairs (xclusive short technique)General knowledge  bangladesh affairs (xclusive short technique)
General knowledge bangladesh affairs (xclusive short technique)
 
Патоморфологія хвороб. лекція 2.
Патоморфологія хвороб. лекція 2.Патоморфологія хвороб. лекція 2.
Патоморфологія хвороб. лекція 2.
 
звс
звсзвс
звс
 

Similar to [cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh and Che Chang

HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
Charles Mok
 
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and Applications
Amit Sheth
 
The language of social media
The language of social mediaThe language of social media
The language of social media
Diana Maynard
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
Japneet Singh
 
We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014
evacide
 
Lecture Chinese media
Lecture   Chinese mediaLecture   Chinese media
Lecture Chinese media
Wilfred Wang
 
Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24
Cheryll Soriano
 
Introduction to Hacktivism
Introduction to HacktivismIntroduction to Hacktivism
Introduction to Hacktivism
Phil Huggins FBCS CITP
 
[打造創業生態體系] 02 如何跟上矽谷產品趨勢
[打造創業生態體系] 02 如何跟上矽谷產品趨勢[打造創業生態體系] 02 如何跟上矽谷產品趨勢
[打造創業生態體系] 02 如何跟上矽谷產品趨勢
National Development Council, Taiwan
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
Andrew Krzmarzick
 
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Dataconomy Media
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Alexia Maddox
 
Stamford innovation week - blockchain day
Stamford innovation week - blockchain dayStamford innovation week - blockchain day
Stamford innovation week - blockchain day
Preston J. Byrne
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
n|u - The Open Security Community
 
Hack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - introHack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - intro
hackdemocracy
 
East of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great FirewallEast of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great Firewall
Miles Metcalfe
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Charles Mok
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
REVULN
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Tom Eston
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
Charles Mok
 

Similar to [cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh and Che Chang (20)

HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and Applications
 
The language of social media
The language of social mediaThe language of social media
The language of social media
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014
 
Lecture Chinese media
Lecture   Chinese mediaLecture   Chinese media
Lecture Chinese media
 
Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24Final ppt ica preconference soriano 5-24
Final ppt ica preconference soriano 5-24
 
Introduction to Hacktivism
Introduction to HacktivismIntroduction to Hacktivism
Introduction to Hacktivism
 
[打造創業生態體系] 02 如何跟上矽谷產品趨勢
[打造創業生態體系] 02 如何跟上矽谷產品趨勢[打造創業生態體系] 02 如何跟上矽谷產品趨勢
[打造創業生態體系] 02 如何跟上矽谷產品趨勢
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
 
Stamford innovation week - blockchain day
Stamford innovation week - blockchain dayStamford innovation week - blockchain day
Stamford innovation week - blockchain day
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Hack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - introHack Democracy San Francisco meetup #1 - intro
Hack Democracy San Francisco meetup #1 - intro
 
East of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great FirewallEast of Eden - online life beyond the Great Firewall
East of Eden - online life beyond the Great Firewall
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
CODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
CODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
CODE BLUE
 
[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...
CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 
[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...[cb22] What I learned from the direct confrontation with the adversaries who ...
[cb22] What I learned from the direct confrontation with the adversaries who ...
 

Recently uploaded

Destyney Duhon personal brand exploration
Destyney Duhon personal brand explorationDestyney Duhon personal brand exploration
Destyney Duhon personal brand exploration
minxxmaree
 
Effective-Recruitment-Strategies and leveraging linkedin
Effective-Recruitment-Strategies and leveraging linkedinEffective-Recruitment-Strategies and leveraging linkedin
Effective-Recruitment-Strategies and leveraging linkedin
DivyaMehta193660
 
stackconf 2024 | On-Prem is the new Black by AJ Jester
stackconf 2024 | On-Prem is the new Black by AJ Jesterstackconf 2024 | On-Prem is the new Black by AJ Jester
stackconf 2024 | On-Prem is the new Black by AJ Jester
NETWAYS
 
Biography of the late Mrs. Stella Atsupui Eddah.pdf
Biography of the late Mrs. Stella Atsupui Eddah.pdfBiography of the late Mrs. Stella Atsupui Eddah.pdf
Biography of the late Mrs. Stella Atsupui Eddah.pdf
AbdulSadickZutah
 
Pengukuran berat badan anak dan tinggi badan anak
Pengukuran berat badan anak dan tinggi badan anakPengukuran berat badan anak dan tinggi badan anak
Pengukuran berat badan anak dan tinggi badan anak
DeviDamayanti53
 
Recruitment articles and posts- different & effective ways of recruitment
Recruitment articles and posts- different & effective ways of recruitmentRecruitment articles and posts- different & effective ways of recruitment
Recruitment articles and posts- different & effective ways of recruitment
Rashi427200
 
calcaneal fracture seminar by dr vishu.pptx
calcaneal fracture seminar by dr vishu.pptxcalcaneal fracture seminar by dr vishu.pptx
calcaneal fracture seminar by dr vishu.pptx
Skmch
 
Risks & Business Risks Reduce - investment.pdf
Risks & Business Risks Reduce  - investment.pdfRisks & Business Risks Reduce  - investment.pdf
Risks & Business Risks Reduce - investment.pdf
Home
 
A study on drug utilization evaluation of bronchodilators using DDD method
A study on drug utilization evaluation of bronchodilators using DDD methodA study on drug utilization evaluation of bronchodilators using DDD method
A study on drug utilization evaluation of bronchodilators using DDD method
Dr. Chihiro
 
Building Digital Products & Content Leadership
Building Digital Products & Content LeadershipBuilding Digital Products & Content Leadership
Building Digital Products & Content Leadership
Rajesh Math
 
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC WorkshopWorkshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
saastr
 
TEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITY
TEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITYTEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITY
TEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITY
AaSs197122
 
the sparks foundation JOB READINESS- how to be job ready. task 2
the sparks foundation JOB READINESS- how to be job ready. task 2the sparks foundation JOB READINESS- how to be job ready. task 2
the sparks foundation JOB READINESS- how to be job ready. task 2
Rashi427200
 
Marketing Articles and ppt on how to do marketing ..Challenges faced during M...
Marketing Articles and ppt on how to do marketing ..Challenges faced during M...Marketing Articles and ppt on how to do marketing ..Challenges faced during M...
Marketing Articles and ppt on how to do marketing ..Challenges faced during M...
ankitamarik05
 
HERO.pdf hero company working cap management project
HERO.pdf hero company working cap management projectHERO.pdf hero company working cap management project
HERO.pdf hero company working cap management project
SambalpurTokaSatyaji
 
stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...
stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...
stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...
NETWAYS
 
At the intersection of SEO & Product - Vanda Pokecz presentation
At the intersection of SEO & Product - Vanda Pokecz presentationAt the intersection of SEO & Product - Vanda Pokecz presentation
At the intersection of SEO & Product - Vanda Pokecz presentation
Vanda Pokecz
 
stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...
stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...
stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...
NETWAYS
 
Call India - AmanTel on the App Store.ppt
Call India - AmanTel on the App Store.pptCall India - AmanTel on the App Store.ppt
Call India - AmanTel on the App Store.ppt
Best International calling app on the market
 
2024-07-07 Transformed 06 (shared slides).pptx
2024-07-07 Transformed 06 (shared slides).pptx2024-07-07 Transformed 06 (shared slides).pptx
2024-07-07 Transformed 06 (shared slides).pptx
Dale Wells
 

Recently uploaded (20)

Destyney Duhon personal brand exploration
Destyney Duhon personal brand explorationDestyney Duhon personal brand exploration
Destyney Duhon personal brand exploration
 
Effective-Recruitment-Strategies and leveraging linkedin
Effective-Recruitment-Strategies and leveraging linkedinEffective-Recruitment-Strategies and leveraging linkedin
Effective-Recruitment-Strategies and leveraging linkedin
 
stackconf 2024 | On-Prem is the new Black by AJ Jester
stackconf 2024 | On-Prem is the new Black by AJ Jesterstackconf 2024 | On-Prem is the new Black by AJ Jester
stackconf 2024 | On-Prem is the new Black by AJ Jester
 
Biography of the late Mrs. Stella Atsupui Eddah.pdf
Biography of the late Mrs. Stella Atsupui Eddah.pdfBiography of the late Mrs. Stella Atsupui Eddah.pdf
Biography of the late Mrs. Stella Atsupui Eddah.pdf
 
Pengukuran berat badan anak dan tinggi badan anak
Pengukuran berat badan anak dan tinggi badan anakPengukuran berat badan anak dan tinggi badan anak
Pengukuran berat badan anak dan tinggi badan anak
 
Recruitment articles and posts- different & effective ways of recruitment
Recruitment articles and posts- different & effective ways of recruitmentRecruitment articles and posts- different & effective ways of recruitment
Recruitment articles and posts- different & effective ways of recruitment
 
calcaneal fracture seminar by dr vishu.pptx
calcaneal fracture seminar by dr vishu.pptxcalcaneal fracture seminar by dr vishu.pptx
calcaneal fracture seminar by dr vishu.pptx
 
Risks & Business Risks Reduce - investment.pdf
Risks & Business Risks Reduce  - investment.pdfRisks & Business Risks Reduce  - investment.pdf
Risks & Business Risks Reduce - investment.pdf
 
A study on drug utilization evaluation of bronchodilators using DDD method
A study on drug utilization evaluation of bronchodilators using DDD methodA study on drug utilization evaluation of bronchodilators using DDD method
A study on drug utilization evaluation of bronchodilators using DDD method
 
Building Digital Products & Content Leadership
Building Digital Products & Content LeadershipBuilding Digital Products & Content Leadership
Building Digital Products & Content Leadership
 
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC WorkshopWorkshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
 
TEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITY
TEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITYTEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITY
TEST WORTHINESS: VALIDITY, RELIABILITY, PRACTICALITY
 
the sparks foundation JOB READINESS- how to be job ready. task 2
the sparks foundation JOB READINESS- how to be job ready. task 2the sparks foundation JOB READINESS- how to be job ready. task 2
the sparks foundation JOB READINESS- how to be job ready. task 2
 
Marketing Articles and ppt on how to do marketing ..Challenges faced during M...
Marketing Articles and ppt on how to do marketing ..Challenges faced during M...Marketing Articles and ppt on how to do marketing ..Challenges faced during M...
Marketing Articles and ppt on how to do marketing ..Challenges faced during M...
 
HERO.pdf hero company working cap management project
HERO.pdf hero company working cap management projectHERO.pdf hero company working cap management project
HERO.pdf hero company working cap management project
 
stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...
stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...
stackconf 2024 | Using European Open Source to build a Sovereign Multi-Cloud ...
 
At the intersection of SEO & Product - Vanda Pokecz presentation
At the intersection of SEO & Product - Vanda Pokecz presentationAt the intersection of SEO & Product - Vanda Pokecz presentation
At the intersection of SEO & Product - Vanda Pokecz presentation
 
stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...
stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...
stackconf 2024 | Buzzing across the eBPF Landscape and into the Hive by Bill ...
 
Call India - AmanTel on the App Store.ppt
Call India - AmanTel on the App Store.pptCall India - AmanTel on the App Store.ppt
Call India - AmanTel on the App Store.ppt
 
2024-07-07 Transformed 06 (shared slides).pptx
2024-07-07 Transformed 06 (shared slides).pptx2024-07-07 Transformed 06 (shared slides).pptx
2024-07-07 Transformed 06 (shared slides).pptx
 

[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven InfoOps targeting Taiwan by Silvia Yeh and Che Chang

  • 1. Che Chang Silvia Yeh From Parroting to Echoing: The Evolution of China’s Bots-Driven InfoOps targeting Taiwan
  • 2. Che Chang Senior Cyber Threat Analyst @TeamT5 Research interests Chinese cybercrime underground market and Information Operation Speaking Engagement Black Hat Asia, HITCON Pacific, Code Blue, SANS CTI Summit, 2020 vGCTF Workshop and Cybersec in Taiwan. Silvia Yeh Cyber Threat Analyst @TeamT5 Research interests APTs and InfoOps in APAC region Speaking Engagement Black Hat Asia, CODE BLUE, SANS CTI Summit, CyberSec, HITCON Pacific, etc.
  • 3. Outline • Intro: China-nexus Bot Networks • From “Parroting” to “Echoing” • Case Study: Operation ChinaRoot • Outlook and Conclusion
  • 4. Our Methodology • CTI Mindset • Actor • Attribution • TTPs • Diamond Model
  • 6. Previous Observation • Limited influence, no organic engagement • Mechanical parroting of Chinese state media • Operations remain persistent for years • New bots are spawned within a short period of time • Notable case: Spamouflage network
  • 8. - Caption + meme - Limited influence, no organic engagement
  • 11. Nuanced Changes in TTPs (1): Hijacking pro-democracy narratives • Blogs/forums → mainstream social media platforms • Create a false appearance that the content is being echoed across the cyberspace • Victims • Milk Tea Alliance (Online democracy and human rights movement) • Intrusion Truth (Anonymous group) • Safeguard Defenders (pan-Asian human rights NGO)
  • 12. Hijacked Identity Trigger Point/Motivation Amplified Narrative Date Milk Tea Alliance Unknown Covid-19 origin conspiracy theory (Fort Detrick) 2022 FEB – 2022 MAY Safeguard Defenders Published a report on Chinese transnational policing Pro-Chinese police content 2022 SEP – 2022 OCT Intrusion Truth 1. Intrusion Truth published an article on APT41 2. Following accusations of NSA’s attack against Northwestern Polytechnical University - APT41 is funded by the U.S. government - APT41 is operated by NSA TAO 2022 JUL - Ongoing Nuanced Changes in TTPs (1): Hijacking pro-democracy narratives
  • 13. kaskus.co.id ID ameblo.jp JP vk.com RU dnyhr.com ASEAN nanyangmoney.com VN/SG/MY mhwmm.com MM xiaoxq.net NAM careerengine.us NAM 6parkbbs.com NAM nairaland.com NG hswh.org.cn CN teamilk951.tumblr.com teamilk115.livejournal.com
  • 14. • Famous “Fort Detrick” conspiracy theory
  • 16. • Shared infra • Narrative overlap: • Taiwan • Xinjiang • Journalist • Lynas Rare Earths (Operation DragonBridge) • Guo Wengui
  • 24. Nuanced Changes in TTPs (2): From “Parroting” to “Echoing” • Local forums → social media platforms → local forums • Create a false appearance that the content is being echoed across the cyberspace • Online communities of different purposes (lifestyle, politics, local community, pets, cryptocurrency, live streaming, marketplace)
  • 26. Operation ChinaRoot (茯苓有點兒甜) • 茯苓 (マツホド) • Over 200 fan pages and bot accounts identified • Botnets overlapped in DRAGONBRIDGE and Spamouflage • Status: ongoing since mid-2021 • Target: Taiwanese online users • Aim: Attack Taiwanese pro-independence politicians • Platforms: Taiwan’s local forums • (卡提諾論壇 Ck101, BabyHome, etc.) Source: Taiwan Ministry of Justice Investigation Bureau (MJIB)
  • 27. Operation ChinaRoot: Key Narratives Defeatism • “PLA is ready to attack Taiwan, Tsai Ing-wen has escaped,” Attack pro-democracy U.S. politicians • “Pelosi’s trip to Taiwan is for financial gain,” Attack Taiwanese government policies • “Taiwanese government covered up Covid- 19 death cases,” • “Taiwan’s Covid measures caused widespread death among children,” • “Taiwan’s own Vaccine is causing people dead.”
  • 32. Narrative during Pelosi’s visit to Taiwan
  • 34. Strategic Overview: Overt Operation • China’s overt operations are always there during every major political event: • Hong Kong pro-democracy protest in 2019 • Taiwan’s major elections • COVID outbreaks • Ukraine war • More collaboration between Chinese and Russian state media outlets and propaganda machine • China’s propaganda machine was amplifying Russia’s disinformation during the Ukraine invasion
  • 35. Strategic Overview: Covert Operation • Operation ChinaRoot • Bot networks may be a shared asset among Chinese nation-state actors • Bot accounts repeatedly deployed in different influence campaigns • Guo Wengui, Xinjiang, Hong Kong, US Covid policies, Taiwan, Ukraine
  • 36. Future Outlook • Social media platforms: critical battlefields for threat actors to launch InfoOps • China’s Overt InfoOp will be more sophisticated. • China’s Covert InfoOp will be more advanced. • Political events are the key driver for InfoOp campaigns. • Mobilization of online netizens • Doxxing: Create harassment against journalists • Protest: Incite protests in the physical world • Strategic Distraction: Breed cynicism, distrust, and defeatism
  • 37. Future Outlook (cont.) • We have seen the covert InfoOp in the times of crises. • Especially in times of war and elections • People on social media will be targeted and exploited by authoritarianism government in major political events • Threat actors react rapidly to current affairs • Upcoming events • 2022 Taiwanese local elections • 2022 U.S. midterm elections
  • 39. Mitigation • To mitigate InfoOp on social media needs all stakeholders. Public Sector #Cyber Governance #Law enforcement #Foreign interference Civil Society #Fact Checking #Media literacy Global Firms #Platform Support #Technical Support
  • 40. Mitigation (For the Law and Policy Track) 1. Review international and domestic laws 2. Start from human Security 3. Build understanding of technology 4. Maintain the collaborative Mechanisms *An approach of cyber threat intelligence CTI approach can provide a better understanding of the threat landscape by connecting dots, hunting down actors, and swiftly detecting suspicious accounts during the early stage • Swift detection of malicious narrative • Detect and Flag the amplifiers and their botnets • Immediate removal and blockage before viral
  • 41. Welcome to visit our booth! TeamT5は日本人セキュリティアナリスト募集中です。 興味がある方は当社ブースにお立ち寄り下さい。 Thank You.