This is your China Hack Report: Daily US Tech Defense podcast.
Hey listeners, Ting here with your China Hack Report. Let's dive straight into what's been hitting US tech defenses in the last twenty four hours because it's been absolutely wild.
First up, the big kahuna. Microsoft SharePoint just got absolutely hammered and we're talking critical severity. CVE-2026-20963, a remote code execution vulnerability that Microsoft patched way back in January, is now actively being exploited in the wild. The Cybersecurity and Infrastructure Security Agency confirmed that Chinese state-backed threat actors are leveraging this to execute arbitrary code on SharePoint servers without needing authentication. No user interaction required. Think about that for a second. According to CISA, attackers from China, Russia, Iran, and North Korea are weaponizing this flaw against financial services, energy, healthcare, government, and manufacturing sectors. The federal deadline for civilian agencies to patch this was March twenty-first, so yeah, we're already past that and CISA is essentially saying everyone else needs to treat this like your house is on fire.
But wait, there's more. The Interlock ransomware gang, linked to Chinese operations, has been exploiting CVE-2026-20131, a maximum severity flaw in Cisco Secure Firewall Management Center software since late January. We're talking unauthenticated remote code execution as root. These attackers have been quietly sitting in networks for months, and security researchers just connected the dots publicly. GitHub is already flooded with proof-of-concept code, so every script kiddie with basic skills now has a roadmap.
On the infrastructure front, the FCC made a historic move by banning all consumer-grade routers made outside the US, specifically citing the Volt Typhoon, Salt Typhoon, and Flax Typhoon campaigns. Yeah, those Chinese state-sponsored operations that targeted critical US communications, energy, transportation, and water systems. Salt Typhoon alone penetrated multiple telecommunications carriers and camped inside their networks for months. Flax Typhoon operated a two hundred sixty thousand device botnet primarily built from compromised consumer routers. So the FCC essentially said no more foreign routers, period, unless manufacturers jump through exemption hoops.
What's particularly nasty is that Handala, another Iranian-linked group, compromised Stryker's Microsoft Intune management console and deployed a device wipe policy across two hundred thousand managed endpoints in seventy-nine countries on March eleventh. Five thousand employees in Ireland got sent home because attackers used legitimate administrative capabilities to trash devices. No malware needed when you can hijack the management system itself.
CISA is mandating immediate patching across all SharePoint instances and strongly recommending organizations hunt for indicators of compromise in their network logs dating back to January twenty-sixth. Your move, listeners.
Thanks for tuning in and remember to subscribe. This has been a quiet please production, for more check out quiet please dot ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
This content was created in partnership and with the help of Artificial Intelligence AI