Categories: Cyber Crime

Chinese criminal underground is doubled between 2012 and 2013

Expert at TrendMicro published a new chapter of the Cybercriminal Underground Economy Series in which analyzed the Chinese underground.

Chinese cybercrime underground activity is rapidly increasing, according to a new interesting report published by Trend Micro the Chinese it is doubled between 2012 and 2013. The findings confirm that amount of underground activity in China doubled both with regard to a number of participants and product and service offerings.

Security experts are always concerned by the state-sponsored operations, but the report highlights that politically independent cybercrime is growing in China.

“The barriers to launching cybercrime have decreased. Toolkits are becoming more available and cheaper; some are even offered free of charge. Prices are lower and features are richer. Underground forums are thriving worldwide, particularly in Russia, China, and Brazil. These have become popular means to sell products and services to cybercriminals in the said countries. Cybercriminals are also making use of the Deep Web to sell products and services outside the indexed or searchable World Wide Web, making their online “shops” harder for law enforcement to find and take down.” states Lion Gu in the report titled “The Chinese Underground in 2013“.

According to Trend Micro CSO Tom Kellermann, cybercrime has likely tripled respect 2012 and cyber criminals are targeting also Chinese capitalists. While Chinese authorities are focused on high profile cyber operations against foreign governments and are increasing their cyber capabilities to present national infrastructure from attack by foreign states, internal underground is growing as never before motivated only by the money and by the fact that cyber crime is difficult to persecute.

China”has been focused externally… on information dominance and espionage,”  “who are not beholden to the regime. They believe money is God and believe that crime has evolved with technology.”Kellermann says.

The analysis conducted by the experts is very interesting, quite similar to the one published last year in the Russian underground, the researchers have been continuously monitoring the Chinese underground market since 2011. By the end of 2013, the experts analyzed more than 1.4 million instant chat messages related to activities in the market for popular instant-messaging (IM) QQ app alone.

QQ Groups is a feature of an IM service provided by Tencent, which allows users to easily manage multi chat groups.

Analyzing the popularity of various products and services offered in the Chinese underground market the expert noticed the greatest interest for the three following products/services:

As already explained in a precedent report published by TrendMicro on the Chinese cybercrime, mobile underground market is the most prolific segment, the black market if focused on the sale/rent of products and services for cyber attacks on mobile platforms, mainly Android.

The report includes price list for the above products, for example an annual license for RAT ranges from $97 to $258, meanwhile criminals could rent DDoS toolkits for $81 per month.

As reported in the table below a DNS server attack cost only $323 and a 10 GB Syn packets per day goes for $161.

 

 

It is interesting to note some differences between Russian and Chinese underground, Chinese groups are more available to general public respect Russians and also communication channels adopted by Chinese criminals are rarely hidden.  But make no mistake, the level of sophistication of threats is equally advanced and dangerous.

This report is a must reading for security experts …. waiting for a new one also on the prolific Brazilian underground market.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – Chinese underground market, cybercrime)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

20 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.