Did a Chinese University Hacking Competition Target a Real Victim?

Seize the flag hacking contests at safety conferences usually serve two functions: to assist members develop and exhibit laptop hacking and safety abilities, and to help employers and authorities companies with discovering and recruiting new expertise.

However one safety convention in China might have taken its contest a step additional—doubtlessly utilizing it as a secret espionage operation to get members to gather intelligence from an unknown goal.

In line with two Western researchers who translated documentation for China’s Zhujian Cup, also referred to as the Nationwide Collegiate Cybersecurity Assault and Protection Competitors, one a part of the three-part competitors, held final 12 months for the primary time, had quite a few uncommon traits that counsel its doubtlessly secretive and unorthodox goal.

Seize the flag (CTF) and different forms of hacking competitions are usually hosted on closed networks or “cyber ranges”—devoted infrastructure arrange for the competition in order that members don’t threat disrupting actual networks. These ranges present a simulated setting that mimics real-world configurations, and members are tasked with discovering vulnerabilities within the methods, acquiring entry to particular elements of the community, or capturing knowledge.

There are two main firms in China that arrange cyber ranges for competitions. Nearly all of the competitions give a shout out to the corporate that designed their vary. Notably, Zhujian Cup didn’t point out any cyber vary or cyber vary supplier in its documentation, leaving the researchers to surprise if it is because the competition was held in an actual setting somewhat than a simulated one.

The competitors additionally required college students to signal a doc agreeing to a number of uncommon phrases. They have been prohibited from discussing the character of the duties they have been requested to do within the competitors with anybody; they needed to agree to not destroy or disrupt the focused system; and on the finish of the competitors, they needed to delete any backdoors they planted on the system and any knowledge they acquired from it. And in contrast to different competitions in China the researchers examined, members on this portion of the Zhujian Cup have been prohibited from publishing social media posts revealing the character of the competitors or the duties they carried out as a part of it.

Members additionally have been prohibited from copying any knowledge, paperwork, or printed supplies that have been a part of the competitors; disclosing details about vulnerabilities they discovered; or exploiting these vulnerabilities for private functions. If a leak of any of this knowledge or materials occurred and triggered hurt to the competition organizers or to China, in accordance with the pledge that members signed, they might be held legally accountable.

“I promise that if any data disclosure incident (or case) happens as a result of private causes, inflicting loss or hurt to the organizer and the nation, I, as a person, will bear obligation in accordance with the related legal guidelines and laws,” the pledge states.

The competition was hosted final December by Northwestern Polytechnical University, a science and engineering college in Xi’an, Shaanxi, that’s affiliated with China’s Ministry of Trade and Data Know-how and likewise holds a top-secret clearance to conduct work for the Chinese language authorities and navy. The college is overseen by China’s Folks’s Liberation Military.

Shopping cart