This is your China Hack Report: Daily US Tech Defense podcast.
Hey listeners, Ting here, your go-to gal for all things China cyber chaos and US tech defense. Buckle up, because the last 24 hours dropped some spicy China-linked bombshells hitting American interests hard—think defense contractors under siege and sneaky edge hacks that make your firewall blush.
Straight out the gate, Google Threat Intelligence just lit up the wires with a report tagging China-nexus crews like UNC3236, aka Volt Typhoon, probing login portals of North American military outfits. These sly foxes used the ARCMAZE obfuscation framework to ghost their tracks while reconning US defense industrial base targets. And get this, UNC6508, another China crew, hijacked a REDCap software update back in late 2023 to plant INFINITERED malware on a US research institution—persistent remote access and credential sniping, all via legit dev tools. Fresh twist: they're deploying operational relay box networks, or ORBs, to mask ops against DIB heavies. Sectors? Aerospace, defense manufacturing—supply chain's the hot spot, with edge devices like routers as the weak link.
Malware alert: APT5, or Mulberry Typhoon, is phishing ex-employees of big US aerospace giants with custom lures. No new zero-days named today, but CISA updated its BRICKSTORM advisory on Ivanti backdoors—China-linked? You bet, as they love those perimeter toys. Meanwhile, Lotus Blossom, that veteran China state-sponsored beast, exploited CVE-2025-15556, now in CISA's Known Exploited Vulnerabilities catalog. FCEB agencies gotta patch by March 5 or eat dirt.
Official warnings? CISA's yelling about four KEVs, including that SolarWinds bypass and Microsoft SQL injection, but China's shadow looms large per Rapid7. Leaked docs from NetAskari via Recorded Future reveal China's "Expedition Cloud" platform—AI-fueled sims hacking power grids, transport, even smarthomes in neighbor nations. No defenders allowed, just attack squads practicing on foreign crit-infra. Taiwan's sweating a digital siege rehearsal.
Defensive moves, stat: CISA says federales patch BeyondTrust's CVE-2026-1731 RCE by Feb 15—it's live exploited via WebSocket tricks. Listeners, hunt ORBs in your logs, segment edge gear, enable MFA everywhere, and drill hiring scams—China's faking job offers to slip in. Run those Ivanti patches, scan for INFINITERED persistence, and watch Gemini AI abuse; Chinese APT31 and UNC795 were cloning it for vuln research till Google axed 'em.
Whew, Beijing's playbook is multi-vector madness, but stay vigilant—you got this. Thanks for tuning in, smash that subscribe for daily drops. This has been a Quiet Please production, for more check out quietplease.ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
This content was created in partnership and with the help of Artificial Intelligence AI