From Coercion to Invasion: The Theory and Execution of China’s Cyber Activity in Cross-Strait Relations
Common Information
Type | Value |
---|---|
UUID | 5fa77446-3893-4d52-8538-15f789697402 |
Fingerprint | 06a034221fd3b205e18583edccdc5c56b4c8e31783a81fb1c93f05a92cebf1ac |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Nov. 22, 2022, 10:03 p.m. |
Added to db | March 10, 2024, 1:28 a.m. |
Last updated | Aug. 31, 2024, 8:14 a.m. |
Headline | From Coercion to Invasion: The Theory and Execution of China’s Cyber Activity in Cross-Strait Relations |
Title | From Coercion to Invasion: The Theory and Execution of China’s Cyber Activity in Cross-Strait Relations |
Detected Hints/Tags/Attributes | 245/3/165 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://go.recordedfuture.com/hubfs/reports/ta-2022-1123.pdf |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 546 | www.recordedfuture.com |
|
Details | Domain | 265 | recordedfuture.com |
|
Details | Domain | 11 | archive.ph |
|
Details | Domain | 8 | ndupress.ndu.edu |
|
Details | Domain | 10 | www.brookings.edu |
|
Details | Domain | 1 | www.gmfus.org |
|
Details | Domain | 10 | thediplomat.com |
|
Details | Domain | 13 | www.rand.org |
|
Details | Domain | 11 | jamestown.org |
|
Details | Domain | 6 | digital-commons.usnwc.edu |
|
Details | Domain | 3 | direct.mit.edu |
|
Details | Domain | 2 | faculty.nps.edu |
|
Details | Domain | 2 | digitalcommons.usf.edu |
|
Details | Domain | 18 | www.cfr.org |
|
Details | Domain | 9 | www.rfa.org |
|
Details | Domain | 7 | www.taipeitimes.com |
|
Details | Domain | 66 | www.washingtonpost.com |
|
Details | Domain | 123 | www.reuters.com |
|
Details | Domain | 99 | therecord.media |
|
Details | Domain | 18 | www.ft.com |
|
Details | Domain | 17 | www.npr.org |
|
Details | Domain | 1 | www.worldscientific.com |
|
Details | Domain | 47 | go.recordedfuture.com |
|
Details | Domain | 105 | web.archive.org |
|
Details | Domain | 4 | theory.people.com.cn |
|
Details | Domain | 1 | armywarcollege.edu |
|
Details | Domain | 111 | www.justice.gov |
|
Details | Domain | 39 | www.wsj.com |
|
Details | Domain | 1 | kjbz.mca.gov.cn |
|
Details | Domain | 1 | www.itsec.gov.cn |
|
Details | Domain | 5 | xinhuanet.com |
|
Details | Domain | 7 | intrusiontruth.wordpress.com |
|
Details | Domain | 26 | www.technologyreview.com |
|
Details | Domain | 4 | www.cnnvd.org.cn |
|
Details | Domain | 10 | query.prod.cms.rt.microsoft.com |
|
Details | Domain | 6 | cset.georgetown.edu |
|
Details | Domain | 604 | www.trendmicro.com |
|
Details | Domain | 182 | www.mandiant.com |
|
Details | Domain | 53 | ncsc.gov.uk |
|
Details | Domain | 55 | blog.google |
|
Details | Domain | 370 | www.proofpoint.com |
|
Details | Domain | 397 | www.microsoft.com |
|
Details | Domain | 35 | www.cnn.com |
|
Details | Domain | 469 | www.cisa.gov |
|
Details | Domain | 262 | www.welivesecurity.com |
|
Details | Domain | 1 | zgxxaq.ckan.cn |
|
Details | Domain | 5 | www.boozallen.com |
|
Details | Domain | 43 | www.cyberscoop.com |
|
Details | Domain | 29 | www.trellix.com |
|
Details | Domain | 4 | taiwannews.com.tw |
|
Details | File | 8 | ndupress.nd |
|
Details | File | 1 | rand_mg507.pdf |
|
Details | File | 1 | dnnlgwick.blob |
|
Details | File | 1 | look_20210614_large-scale%20amphibious%20warfare%20in%20chinese%20military%20strategy.pdf |
|
Details | File | 66 | www.ai |
|
Details | File | 1 | flemming_iccws15.htm |
|
Details | File | 1 | rand_mg877.pdf |
|
Details | File | 1 | cyberattacks-05072020140817.html |
|
Details | File | 2 | china-perspectives_13.pdf |
|
Details | File | 1 | ta-2022-0310.pdf |
|
Details | File | 1 | 26716789.html |
|
Details | File | 1 | t20050308_15173.html |
|
Details | File | 1 | c_1122600133.htm |
|
Details | File | 8 | www.asp |
|
Details | File | 7 | cset.geo |
|
Details | File | 1 | cta-2022-0922.pdf |
|
Details | File | 2 | earth-lusca-operations.pdf |
|
Details | File | 1 | cta-2018-0816.pdf |
|
Details | File | 1 | ta-2022-0816.pdf |
|
Details | File | 816 | index.html |
|
Details | File | 1205 | index.php |
|
Details | File | 4 | cds19-executive-s08-achievement-unlocked.pdf |
|
Details | File | 2 | rpt-malware-supply-chain.pdf |
|
Details | File | 1 | china-cyber-report.pdf |
|
Details | File | 1 | cyber-tools-and-foreign-policy.html |
|
Details | Threat Actor Identifier - APT | 143 | APT40 |
|
Details | Threat Actor Identifier - APT | 522 | APT41 |
|
Details | Threat Actor Identifier - APT | 166 | APT31 |
|
Details | Threat Actor Identifier - APT | 297 | APT27 |
|
Details | Threat Actor Identifier - APT | 115 | APT1 |
|
Details | Threat Actor Identifier - APT | 278 | APT10 |
|
Details | Threat Actor Identifier - APT | 78 | APT3 |
|
Details | Threat Actor Identifier by Recorded Future | 18 | TAG-22 |
|
Details | Url | 2 | https://ndupress.ndu.edu/publications/books/crossing-the-strait |
|
Details | Url | 1 | https://www.brookings.edu/research/from-persuasion-to-coercion-beijings- |
|
Details | Url | 1 | https://www.gmfus.org/news/distortion-un-resolution-2758-and-limits-taiwans- |
|
Details | Url | 1 | https://www.rand.org/content/dam/rand/pubs/monographs/2007/rand_mg507.pdf |
|
Details | Url | 1 | https://www.airuniversity.af.edu/casi/display/article/2421219/in-their-own-words-plas-science-of-campaigns/. |
|
Details | Url | 1 | https://www.airuniversity.af.edu/casi/display/article/2485204/plas-science-of-military-strategy-2013/. |
|
Details | Url | 3 | https://jamestown.org/program |
|
Details | Url | 1 | https://digital-commons.usnwc.edu/cgi |
|
Details | Url | 1 | https://direct.mit.edu/isec/article-abstract/44/1/117/12241 |
|
Details | Url | 1 | https://faculty.nps.edu/ncrowe/oldstudents/flemming_iccws15.htm |
|
Details | Url | 1 | https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=8190&context=etd |
|
Details | Url | 1 | https://www.rand.org/content/dam/rand/pubs/monographs/2009/rand_mg877.pdf |
|
Details | Url | 1 | https://www.cfr.org/blog |
|
Details | Url | 1 | https://www.andrewerickson.com/2019/07/full-text-of-defense-white-paper-chinas-national-defense-in-the-new-era-english-chinese- |
|
Details | Url | 1 | https://archive.ph/ctjji. |
|
Details | Url | 1 | https://archive.ph/qi7o5. |
|
Details | Url | 1 | https://archive.ph/qvavf. |
|
Details | Url | 1 | https://www.rfa.org/english/news/china |
|
Details | Url | 1 | https://www.taipeitimes.com/news/taiwan/archives/2022/08/05/2003783012 |
|
Details | Url | 5 | https://www.washingtonpost.com |
|
Details | Url | 1 | https://www.reuters.com/world/attacks- |
|
Details | Url | 1 | https://www.ft.com |
|
Details | Url | 1 | https://www.nbcnews.com/politics/congress/pelosi-invited-senior-lawmakers-join-taiwan-trip-top-republican-says-rcna40242 |
|
Details | Url | 2 | https://www.washingtonpost |
|
Details | Url | 1 | https://www.npr.org/2022/08/04/1115550972/china-taiwan-missile-exercises. |
|
Details | Url | 1 | https://ndupress.ndu.edu/publications/books/pla- |
|
Details | Url | 1 | https://archive.ph/s2ech. |
|
Details | Url | 1 | https://www.worldscientific.com/doi/pdf/10.1142/s2630531319500021. |
|
Details | Url | 1 | https://ndupress.ndu.edu/portals/68/documents/stratperspective |
|
Details | Url | 2 | https://digital-commons.usnwc.edu/cmsi-maritime-reports/20/. |
|
Details | Url | 1 | https://go.recordedfuture.com/hubfs/reports/ta-2022-0310.pdf |
|
Details | Url | 1 | https://www.recordedfuture.com/the-role-of-us-technology-in-china-public-security-system. |
|
Details | Url | 1 | https://web.archive.org/web/20220921155654/http://theory.people.com.cn/n/2015/0319/c386965- |
|
Details | Url | 2 | https://www.justice.gov/opa/press- |
|
Details | Url | 3 | https://www.justice.gov/opa |
|
Details | Url | 1 | https://www.wsj.com/articles/chinas-secret-weapon-in-south-korea-missile-fight-hackers-1492766403. |
|
Details | Url | 1 | https://archive.ph/emler. |
|
Details | Url | 1 | https://archive.ph/jr0un |
|
Details | Url | 2 | https://web.archive |
|
Details | Url | 1 | http://kjbz.mca.gov.cn/article/mzbzhzcwj/201106/20110600157934.shtml |
|
Details | Url | 1 | https://www.recordedfuture.com/chinese-mss-behind- |
|
Details | Url | 1 | https://web.archive.org/web/20221102002419/http://www.itsec.gov.cn/zxxw/200503/t20050308_15173.html |
|
Details | Url | 1 | https://archive.ph/pld4n |
|
Details | Url | 3 | https://archive.ph |
|
Details | Url | 1 | https://web.archive.org/web/20200808220056/http |
|
Details | Url | 1 | https://archive.ph/n9klo |
|
Details | Url | 1 | https://archive.ph/kuzwx. |
|
Details | Url | 2 | https://intrusiontruth.wordpress.com/2020/01/10/who-is-mr-gu |
|
Details | Url | 1 | https://intrusiontruth.wordpress.com/2020/01/16 |
|
Details | Url | 1 | https://www.justice.gov/opa/press-release/file/1412916/download. |
|
Details | Url | 1 | https://intrusiontruth.wordpress.com/2020/01/09/what-is-the-hainan-xiandun-technology-development-company |
|
Details | Url | 1 | https://archive.ph/q5pkk |
|
Details | Url | 1 | https://web.archive.org/web/20220501130153/https://www.cnnvd.org.cn/web/xxk/cjwt.tag |
|
Details | Url | 1 | https://www.recordedfuture.com/chinese-mss-vulnerability-influence. |
|
Details | Url | 1 | https://www.aspistrategist.org.au/chinas-vulnerability-disclosure-regulations-put-state-security-first/. |
|
Details | Url | 1 | https://query.prod.cms.rt.microsoft.com/cms/api/am/binary |
|
Details | Url | 1 | https://cset.georgetown.edu/publication/downrange-a-survey-of-chinas-cyber-ranges/. |
|
Details | Url | 1 | https://web.archive.org/web/20210920201544/http |
|
Details | Url | 1 | https://www.trendmicro.com/content/dam/trendmicro |
|
Details | Url | 1 | https://www.mandiant.com/resources/blog/messagetap-who-is-reading-your-text- |
|
Details | Url | 1 | https://go.recordedfuture.com/hubfs |
|
Details | Url | 5 | https://www.reuters.com |
|
Details | Url | 1 | https://blog.google/threat-analysis-group/how-were- |
|
Details | Url | 1 | https://www.proofpoint.com/us/blog/threat-insight/chasing-currents-espionage-south-china-sea/. |
|
Details | Url | 1 | https://go.recordedfuture.com/hubfs/reports/ta-2022-0816.pdf |
|
Details | Url | 2 | https://www.justice.gov/opa/pr/two- |
|
Details | Url | 2 | https://www.microsoft.com/security/blog/2020/09/24/gadolinium-detecting-empires-cloud |
|
Details | Url | 1 | https://www.cnn.com/2021/04/20/politics/fireeye-pulse-secure-vpn-exploit/index.html |
|
Details | Url | 1 | https://www.cisa.gov/uscert/ncas/alerts/aa22-158a. |
|
Details | Url | 1 | https://www.dni.gov/index.php/ncsc-newsroom/item/2002-ncsc-director-warns-of-nation-state-cyber-threats- |
|
Details | Url | 2 | https://www.npr |
|
Details | Url | 3 | https://www.fireeye.com/content/dam/fireeye-www/summit/cds-2019/presentations/cds19-executive-s08-achievement-unlocked.pdf |
|
Details | Url | 2 | https://www.mandiant.com/sites/default/files/2021-09/rpt-malware-supply-chain.pdf |
|
Details | Url | 1 | https://web.archive.org/web/20220927182209/http://zgxxaq.ckan.cn/. |
|
Details | Url | 1 | https://archive.ph/lkkj2. |
|
Details | Url | 1 | https://medium.com/cycraft/china-linked-threat-group-targets-taiwan-critical-infrastructure-smokescreen-ransomware-c2a155aa53d5. |
|
Details | Url | 2 | https://www.microsoft.com/en-us/security |
|
Details | Url | 1 | https://www.cyberscoop.com/iran-ransomware-israel-sentinelone/. |
|
Details | Url | 1 | https://archive.ph/z3zth |
|
Details | Url | 1 | https://archive.ph/mqmnx. |
|
Details | Url | 1 | https://archive.ph/rnayn. |
|
Details | Url | 1 | https://www.trellix.com/en-us/about/newsroom/stories/research/cyber-tools-and-foreign-policy.html |