Eugenio Benincasa's Avatar

Eugenio Benincasa

@euben.bsky.social

Cyber Defense Researcher @ethz.ch. Former Italian govt, Pacific Forum and NYPD. LUISS & Columbia University Alum.

293 Followers  |  185 Following  |  56 Posts  |  Joined: 25.10.2023  |  2.4102

Latest posts by euben.bsky.social on Bluesky

Canโ€™t wait for this :)

01.08.2025 09:25 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
When Privileged Access Falls into the Wrong Hands: Chinese Companies in Microsoftโ€™s MAPP Program Chinese companies face conflicting pressures between MAPPโ€™s non-disclosure requirements and domestic policies that incentivize or mandate vulnerability disclosure to the state.

Available here: nattothoughts.substack.com/p/when-privi...

31.07.2025 16:44 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Microsoft is probing whether a MAPP leak let Chinese hackers exploit a SharePoint vuln pre-patch.

In this new piece for Natto,
@dakotaindc.bsky.social, @meidanowski.bsky.social & I dig into:
๐Ÿ›๏ธ China's vuln reporting rules
๐Ÿ“‰ Which firms joined/left MAPP since 2018
โš ๏ธ The risks todayโ€™s members pose

31.07.2025 16:44 โ€” ๐Ÿ‘ 5    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Microsoft Probing If Chinese Hackers Learned of Flaws Via Alert Microsoft Corp. is investigating whether a leak from its early alert system for cybersecurity companies allowed Chinese hackers to exploit flaws in its SharePoint service before they were patched, acc...

New: Microsoft is investigating whether a leak from its early alert system for cybersecurity companies allowed Chinese hackers to exploit flaws in SharePoint before they were patched, enabling a global campaign of cyberattacks, according to people familiar: www.bloomberg.com/news/article...

25.07.2025 18:34 โ€” ๐Ÿ‘ 7    ๐Ÿ” 10    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Hooked! #5: A series of new reports and research shows that Chinaโ€™s tech sector is on the offense A series of new reports and research shows that Chinaโ€™s tech sector is on the offense

In the latest Hooked!, editor @katharinegk.bsky.social ties together some fascinating recent research from @benread.bsky.social , @euben.bsky.social, @winnona.bsky.social, and others on private sector elements of Chinese offensive cyber: bindinghook.com/articles-hoo...

25.07.2025 08:31 โ€” ๐Ÿ‘ 6    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Before Vegas: The โ€œRed Hackersโ€ Who Shaped Chinaโ€™s Cyber Ecosystem This CSS Cyberdefense report by Eugenio Benincasa examines how a core group of red hackers from the 1990s and 2000s laid the groundwork for Chinaโ€™s modern cyber capabilities andย traces their trajector...

css.ethz.ch/en/center/CS...

21.07.2025 16:09 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Before Vegas โ€“ The โ€œRed Hackersโ€ Who Shaped Chinaโ€™s Cyber Ecosystem (Center for Security Studies at ETH Zรผrich): css.ethz.ch/content/dam/...

21.07.2025 11:39 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

6/ Sincerely grateful to the all-star team of experts who shared their insights and feedback: Scott Henderson (Google Mandiant), Adam Kozy (SinaCyber), @meidanowski.bsky.social (@nattothoughts.bsky.social), @thegrugq.bsky.social, @Chris St.Myers (SentinelOne), & Charles Li and Zha0 (TeamT5)

21.07.2025 08:11 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

5/ The key lesson: what begins in anonymous forums can end in boardrooms and on digital battlefields. Overlooking civilian hacking talent is a strategic risk.

21.07.2025 08:11 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
How Chinaโ€™s Patriotic โ€˜Honkersโ€™ Became the Nationโ€™s Elite Cyberspies A new report traces the history of the early wave of Chinese hackers who became the backbone of the state's espionage apparatus.

@kimzetter.bsky.social's excellent piece for Wired unpacks the state-linked side of the story, covering the report and Adam Kozyโ€™s research: www.wired.com/story/china-...

21.07.2025 08:11 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

3/ Some Red 40 hackers have carried out operations on behalf of Chinaโ€™s military and intelligence services. Their informal networks, formed during their teens or twenties as members of the same hacking groups, exemplify tool sharing and collab that underpins Chinaโ€™s APTs MO.

21.07.2025 08:11 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

2/ It identifies 40 prominent red hackers โ€” โ€œThe Red 40โ€ โ€” who shaped Chinaโ€™s cyber ecosystem from the ground up. It tells the story of how these individuals transitioned from online forums to becoming part of a tightly integrated ecosystem.

Full report:
css.ethz.ch/en/center/CS...

21.07.2025 08:11 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

1/ Chinaโ€™s cyber capabilities didnโ€™t start top-down, they started with raw hacking talent. The new CSS/ETH report "Before Vegas" traces how informal talent shaped Chinaโ€™s cyber ecosystem, moving from online forums to industry leaders (link in thread).

21.07.2025 08:11 โ€” ๐Ÿ‘ 13    ๐Ÿ” 8    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

haha haven't spent too much time around here

20.07.2025 21:06 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Thank you ๐Ÿ™ really appreciate it!

20.07.2025 21:05 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Thank you! Iโ€™d definitely add Alex Josieโ€™s โ€œSpies and Liesโ€ to the book list

20.07.2025 13:07 โ€” ๐Ÿ‘ 4    ๐Ÿ” 0    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0

Thank you! Looking forward to hearing your thoughts on it

19.07.2025 02:03 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Fully agree, Patrick. I also love his work. He was very kind to review the report and provide feedback before publication ๐Ÿ˜Š

19.07.2025 01:51 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
How Chinaโ€™s Patriotic โ€˜Honkersโ€™ Became the Nationโ€™s Elite Cyber Spies A new report traces the history of the early wave of Chinese hackers who became the backbone of the state's espionage apparatus.

How did China's top APT hackers come to be? Many were early "Honkers" - patriotic hackers who in late 90s launched low-skill cyberattacks against nations deemed disrespectful to China. But once Honkers developed their skills, PLA/MSS came calling. Based on great research by bsky.app/profile/eube...

18.07.2025 15:48 โ€” ๐Ÿ‘ 58    ๐Ÿ” 31    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Preview
Pick Your Innovation Path in AI: Chinese Edition Chinaโ€™s advances in AI show the effects of a state approach of โ€œintroduce, digest, absorb, re-innovateโ€ and years of debate on the balance between market-driven innovation and state-led development

How has China advanced its AI development to its current state? No single innovation path in AI can be considered definitive.

nattothoughts.substack.com/p/debating-c...

10.07.2025 19:14 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
America is coming after Chinese it accuses of hacking Xu Zewei was arrested in Milan on July 3rd

I wrote on the arrest in Italy of Xu Zewei, an alleged Chinese hacker, perhaps the first case where America has sought to extradite a Chinese hacker for mainly or exclusively cyber operationsโ€”in this case theft of Covid research during the pandemic. www.economist.com/china/2025/0...

11.07.2025 06:27 โ€” ๐Ÿ‘ 71    ๐Ÿ” 12    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Mobilizing Cyber Power: The Growing Role of Cyber Militias in Chinaโ€™s Network Warfare Force Structure This report examines how Chinaโ€™s cybersecurity industry fields reserve and militia units in support of the PLA and national mobilization system.

โ€œalignment with CCP priorities offers privileged access to state resources, regulatory favor, and expanded commercial opportunities [to hackers]."

NEW Phenomenal report on Chinese civil military fusion and cyber militias by Kieran Green: margin.re/mobilizing-c...

09.07.2025 12:19 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace If the United States wishes to compete in cyberspace, it must compete against China to secure its offensive cyber supply chain.

๐Ÿšจ NEW PAPER on the 0day Supply Chain ๐Ÿšจ:
I gathered open source data & interviewed Gov employees, VR and china researchers to figure out what the zero day marketplace looks like in the U.S. and how it compares to China.

key findings below โฌ‡๏ธ- 0/๐Ÿงต โ€จwww.atlanticcouncil.org/in-depth-res...

25.06.2025 13:11 โ€” ๐Ÿ‘ 26    ๐Ÿ” 17    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 2

I think European countries are struggling even to allow government teams to do this kind of work, so extending it to broader private sector involvement seems unlikely to me as things stand

13.06.2025 20:13 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

I agree they should rethink current approaches, starting from talent development.

13.06.2025 12:14 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Defense-Through-Offense Mindset: From a Taiwanese Hacker to the Engine of Chinaโ€™s Cybersecurity Industry The belief that offense enables defense in cyberspace, first rooted in Chinaโ€™s 1990s hacker culture, has since permeated the countryโ€™s cyber ecosystem

To defend, one must first know how to attackโ€ (ๆœช็Ÿฅๆ”ป๏ผŒ็„‰็Ÿฅ้˜ฒ). This mindset, popularized by a Taiwanese hacker Lin in the 1990s, spread from China's red hackers to CTF teams. Today, it powers China's cyber industry.

New piece for @nattothoughts.bsky.social

nattothoughts.substack.com/p/defense-th...

11.06.2025 16:17 โ€” ๐Ÿ‘ 6    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
Preview
From Humble Beginnings: How a Vocational College Became a Vulnerability Powerhouse Qingyuan Polytechnic's focus on vulnerability studies highlights China's continued efforts in gathering vulnerability resources

The Natto Team explores the development of China's vulnerability research and discovery skills, starting from the vocational college level.

Thanks to @euben.bsky.social @dakotaindc.bsky.social Kristin Del Rosso for their previous research on the topic

nattothoughts.substack.com/p/when-a-voc...

28.05.2025 16:46 โ€” ๐Ÿ‘ 11    ๐Ÿ” 7    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Preview
From the World of โ€œHacker X Filesโ€ to the Whitewashed Business Sphere Jiang Jintaoโ€™s journey from hacker to infosec entrepreneur illustrates the blend of ambition, skill, and changes in China's cybersecurity industry

The Natto Team continues finding stories of Chinese hackers fascinating as they reveal the motivations behind cyber operations and the evolution of China's information security industry.

nattothoughts.substack.com/p/stories-of...

14.05.2025 16:22 โ€” ๐Ÿ‘ 5    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 2
Preview
Sowing the seeds of enhanced cybersecurity cooperation within the G7 Officials from the Italian National Cybersecurity Agency discuss the challenges and successes of creating the new G7 Cybersecurity Working Group

In their latest for #BindingHook, Massimo Marotti, Matteo E. Bonfanti, and Giovanni Faleg of the Italian National Cybersecurity Agency reflect on the process of forming the new #G7CybersecurityWorkingGroup: bindinghook.com/articles-hoo...

12.05.2025 06:51 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Russie โ€“ Attribution de cyberattaques contre la France au service de renseignement militaire russe (APT28) (29.04.25) La France condamne avec la plus grande fermetรฉ le recours par le service de renseignement militaire russe (GRU) au mode opรฉratoire d'attaque APT28, (โ€ฆ)

Fascinating to see reference to GRU unit 20728 from FR relative to Russia's offensive cyber program -- as far as I'm aware, a first from a Western service?

www.diplomatie.gouv.fr/fr/dossiers-...

29.04.2025 17:16 โ€” ๐Ÿ‘ 17    ๐Ÿ” 7    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 0

@euben is following 20 prominent accounts