2 Males Linked to China’s Salt Storm Hacker Group Seemingly Educated in a Cisco ‘Academy’

Metro Loud
21 Min Read


To attempt to decide the chance of these title repetitions being a coincidence, Cary checked two databases of Chinese language names and consulted with Yi Fuxian, a professor of Chinese language demography on the College of Wisconsin–Madison. The title Qiu Daibing—or 邱代兵 in Chinese language characters—turned out to be a comparatively unlikely title to indicate up twice simply by probability, he says. The surname 邱 alone, Yi confirmed to WIRED, represents simply 0.27 % of Chinese language names, and together with the precise 代兵 given title would signify a much smaller share.

The title Yu Yang (余洋 in Chinese language characters) is extra widespread. However the two names showing in affiliation appears much less prone to be a coincidence, Cary theorizes. “The sheer improbability of someone having this title additionally being paired with a Yu Yang, having this talent set and going to the identical college in the identical location the place these firms are registered, it is simply an extremely small probability that these will not be the proper individuals,” Cary argues.

WIRED tried to contact Qiu Daibing and Yu Yang through each Qiu Daibing’s LinkedIn web page and an electronic mail tackle on the web site of Beijing Huanyu Tianqiong however obtained no response.

If Cary’s idea that two males linked to Salt Storm have been in actual fact educated in Cisco’s Networking Academy is appropriate, it does not signify a flaw or safety oversight in Cisco’s program, he says. As an alternative, it factors to a tough-to-avoid difficulty in a globalized market the place know-how merchandise—and even coaching within the technical particulars of these merchandise—are extensively accessible, together with to potential hacking adversaries.

Cary argues that the difficulty has solely change into extra obvious, nevertheless, as China has tried for years to interchange Cisco tools and different Western units in its personal networks with home alternate options. “If China is shifting within the route of really eradicating these merchandise from Chinese language networks,” Cary asks, “who’s nonetheless involved in studying about them?”

China has, in the meantime, more and more restricted its personal information-sharing with the worldwide cybersecurity group, factors out John Hultquist, chief analyst at Google’s Risk Intelligence Group, for example, by pressuring safety researchers to not current findings at worldwide conferences.

“It is like we’re in a sharing group, and so they’ve informed us straight to our face that they don’t seem to be going to reciprocate,” Hultquist says. “We’re benefiting them with our applications. Nevertheless it’s not going within the different route.”

Share This Article