This is your China Hack Report: Daily US Tech Defense podcast.
Hey listeners, Ting here with your daily US Tech Defense on China-linked cyber chaos—straight from the wire, no fluff. Over the last 24 hours, Google's Threat Intelligence Group and Mandiant dropped a bombshell: China-backed UNC2814, aka Gallium, just got disrupted after infiltrating 53 orgs across 42 countries, including US telecoms and government spots. These sneaky pros hid GRIDTIDE backdoor malware right in Google Sheets API—yep, commandeering cell A1 for commands, V1 for exfil dumps on hosts, users, and networks. Prolific doesn't cover it; they've been at this since 2017, spying on persons of interest via telecom espionage, separate from Salt Typhoon but same shady goals. Google yanked their cloud projects, sinkholed domains, updated malware sigs, and pinged victims—smart move, but expect Gallium to claw back their global footprint.
Switching gears to critical infrastructure: CISA's Emergency Directive 26-03 hit yesterday, mandating federal agencies patch Cisco Catalyst SD-WAN devices by 5 PM ET Friday, February 27. Why? Zero-day CVE-2026-20127, a max-severity auth bypass exploited since 2023 by sophisticated actors—likely Chinese APTs per Taiwan's security firm confirmations. Paired with old CVE-2022-20775 for root escalations, attackers add rogue peers, burrow deep into SD-WAN fabrics linking branches, data centers, clouds. Cisco Talos tracks it as UAT-8616; ASD's ACSC flagged it first. CISA, NSA, UK's NCSC, Aussies, Canadians, Kiwis all screaming: inventory now, grab logs from /var/log/auth.log for weird vmanage-admin logins, /var/volatile/log/vdebug for downgrade tricks, hunt IOCs like rogue SSH keys or tiny logs. Harden by firewalling management interfaces—no internet exposure, external log forwarding, fresh installs if rooted. Businesses, same drill—patch or perish.
Sectors hammered? Telecoms like Singapore's big four still reeling from prior Gallium-style hits, energy echoing Poland's OT credential flops that CISA warned US grids about. No fresh malware beyond GRIDTIDE, but CISA's patching urgency screams imminent US threats.
Defend like pros, listeners: MFA everywhere, segment IT/OT, audit vendors—China's playing chess while we're scrambling. Stay vigilant.
Thanks for tuning in—subscribe for more intel drops! This has been a Quiet Please production, for more check out quietplease.ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
This content was created in partnership and with the help of Artificial Intelligence AI