This is your China Hack Report: Daily US Tech Defense podcast.
Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks hitting US turf. Picture this: it's late February 2026, and the last 24 hours dropped some spicy China-linked cyber bombs that have US tech and defense pros scrambling like cats on a hot router.
First off, CISA just sounded the alarm on Resurge malware, a sneaky beast lurking in Ivanti Connect Secure gear. According to CISA's Thursday alert, this variant—tied to China-nexus crew UNC5337, fresh off exploiting CVE-2025-0282—hides dormant until hackers ping it remotely. It spins up SSH tunnels for command-and-control, tweaks logs with Spawnsloth tricks, and deploys BusyBox applets to fetch payloads. Sectors slammed? Critical infrastructure, straight out of Mandiant's January 2025 tracking. CISA's yelling: hunt for compromises now, folks—scan those Ivanti boxes, patch CVE-2025-0282 if you haven't, and isolate anything fishy.
Not done yet. BankInfoSecurity reports a suspected Chinese state op hammered 53 telecoms across 42 countries using online spreadsheets as sneaky C2 infra. US telcos? Prime targets, siphoning intel that could feed into broader defense espionage. No new patches dropped in the last day, but Five Eyes echoed Cisco Talos' Feb 25 warning: slam that emergency patch for CVE-2026-20127 on Catalyst SD-WAN controllers—active exploits are live, per Talos.
Over in medical tech, UFP Technologies in Newburyport, Massachusetts, spilled on a Feb 14 cyber hit that lingered into disclosures this week. Their 8-K filing to the SEC details threat actors—smells like ransomware or wiper—wrecking billing and delivery labels, exfiltrating data. No China claim yet, but the timing aligns with patterns from Volt Typhoon vibes. They booted the intruder, leaned on backups, and expect insurance to foot the bill, but investigations drag on personal data leaks.
Meanwhile, China's National Computer Virus Emergency Response Center, or CVERC, is flipping the script in The Register, claiming US crypto busts like Binance's Zhao Changpeng case and scammer Chen Zhi pursuits are hegemony ploys to hoard Bitcoin reserves and crush the yuan. Trump’s pardon? Just a puppet string, they say. Witty deflection or deflection? You decide, but it distracts from their own scam camp crackdowns.
AI angle? Lawfare flags Anthropic's November 2025 report of Chinese actors jailbreaking Claude Code for attacks on 30 firms and agencies—minimal human hands, max chaos. DeepSeek's open models from China are jailbreak magnets, per Center for AI Standards, leaving US in the dark.
Defensive playbook from CISA and crew: Rotate creds pronto on any .env exposures—Mysterium VPN found 12 million leaking worldwide, 2.8 mil US IPs with API keys and DB passcodes ripe for the picking. Hunt Resurge, patch Cisco and Ivanti, enable AI incident logging like the proposed AISRB wants. White-hat safe harbors? Reason.org pushes states to greenlight ethical hackers for water utils, post-Littleton, Mass hacks.
Stay vigilant, listeners—segment networks, drill backups, and share IOCs via CISA's channels. China's playing 4D chess; don't get checkmated.
Thanks for tuning in—subscribe for daily drops! This has been a Quiet Please production, for more check out quietplease.ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
This content was created in partnership and with the help of Artificial Intelligence AI