The Bear and The Dragon: Analyzing the Russian and Chinese Cybercriminal Communities

Understand the threats to preemptively protect your organization from Russian and Chinese cybercriminal groups.

Download Now

The cybercriminal communities in Russia and China have emerged and evolved as a result of their respective regional cultures and circumstances. Understanding the underlying motives, dependencies, characteristics, and moda operandi of each community is critical in order to truly discern the threats they pose, and to preemptively prepare for the manner in which these threats could potentially evolve.

While these two ecosystems have historically remained separate, recently, the Russian and Chinese cybercriminal worlds seem to have collided in a fledgling alliance, with Russian-speaking dark web forums adapting their platforms to make them accessible to Mandarin- and English-speaking users, and Russian threat actors actively seeking to collaborate with their Chinese counterparts. Given Russian-speaking cybercriminals’ sophistication and their constantly evolving modus operandi, the transfer of this knowledge to Chinese threat actors is especially concerning.

the bear and the dragon

Download the report to learn what this collaboration might mean to the cyber threat landscape:

China’s cybercriminal community is dedicated to its own, helping one another to build a stronger, more experienced Chinese hacking collective.

Russian cybercriminals are highly advanced, ruthless, and motivated by one thing above all else – money.

Russian-speaking forums and marketplaces on the deep and dark web are focused on organizing and classifying communications based on level of expertise and area of activity.

Due to the strict internet restrictions imposed by their government, the Chinese cybercriminal underground exists in two parallel arenas: on the clear web and Chinese-language dark web platforms.

Download the Report

How Cybersixgill’s products can help your business?

Contact our experts to discover which solutions are best for your company

Book a demo

Recommended resources


Threat Hunting for Effective Risk Management

Protect Critical Assets and Minimize Risk with Proactive, Contextual Threat Intelligence

Read now

Unveiling the Power of Identity Intelligence: Safeguarding Personal Identities in an Interconnected World

This webinar aims to shed light on the significance of Identity Intelligence and its role in safeguarding individuals.

Watch now

Cybersecurity in Focus: Finance

Get ahead of cyber threats targeting the financial sector with our latest ebook.

Read now