Cybersecurity

Illustration by Megan J. Goff

Inside the i-Soon papers and China’s secret world of hackers-for-hire

Hacking

Newly leaked files from a private Chinese hackers-for-hire company provide a fresh look into China’s “cyber industrial complex” — and it appears to be bigger and more mature than observers had previously imagined. Dina Temple-Raston, host and managing editor of the Recorded Future News podcast “Click Here,” has the story.

Black blue and gray illustration of people coming out of phones

Spyware found on phones in Jordan

Hacking
Inside of a computer

Countries fear state-sponsored cyberwar

Cybersecurity
Illustration by Megan J. Goff

Threat-hunter says Iran is stepping up the sophistication of its cyberattacks

Cybersecurity
Blue, gray and white illustration of flys in cage

China’s dominant role in producing hacking bugs

Global Security
illustration

Exclusive: Inside an American hunt forward operation in Ukraine

Ukraine

In an interview with Recorded Future News’ podcast “Click Here,” Hartman says the cooperation between the US and foreign partners like Ukraine has become important in the effort to deter Russia’s cyber operations.

Black, blue and grey illustration of man looking over small figures

The hacker Bassterlord in his own words: Portrait of an access broker as a young man

Hacking

He started off doing simple phishing attacks. But the Russian, who is known as Bassterlord, soon graduated to planting ransomware in emails, holding companies’ data hostage. And he quickly became one of the best. In her exclusive interview with the hacker, Dina Temple-Raston of the “Click Here” podcast delves into the ransomware underworld.

Graphic of Chinese President Xi Jinping.

China’s tech weapons roll in to quell demonstrations, identify protesters

Free speech

The latest demonstrations across China ended when the central government unleashed a digital arsenal that was less deadly than the tanks used to quell the 1989 protests, but just as effective. China managed to use the internet to defuse national outrage over President Xi Jinping’s strict COVID-19 policies without firing a single shot.

In this June 19, 2017, file photo, a person types on a laptop keyboard in North Andover, Massachusetts. 

‘Ransomware Diaries:’ Going undercover with the leader of LockBit

Cybersecurity

Jon DiMaggio, chief security analyst at Analyst1, spent more than a year inside LockBit private channels interacting with LockBitSupp and other members. He recently released a report called “Ransomware Diaries: Volume 1,” that revealed how he infiltrated the group and what he learned while he was on the inside.

A woman typing on a laptop on a train in New Jersey

What comes after Hydra, the darknet marketplace that changed everything?

Internet

Dina Temple-Raston of the “Click Here” podcast spoke with Niko Vorobyov, the Russian author of Dopeworld and Kim Grauer, director of research at Chainalysis and an expert in cryptocurrency economics and crime, about Hydra, its closure in April and who or what is likely to replace it.