China Hack Report: Daily US Tech Defense

China Hacks Rampage: React2Shell & BRICKSTORM Chaos, US Nukes Probed, VMware Backdoored, Sanctions Fly!


Listen Later

This is your China Hack Report: Daily US Tech Defense podcast.

Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks hitting US tech defenses. Buckle up, because the last 24 hours as of December 13 have been a whirlwind of urgent patches and fresh alerts—let's dive straight into the chaos.

Picture this: I'm sipping my late-night baijiu-laced coffee when CISA drops the hammer on React2Shell, that nasty CVE-2025-55182 with a perfect CVSS 10.0 score. Just yesterday, December 12, they revised the federal patch deadline to immediate action, no more lollygagging till December 26. Why? Chinese hackers—yeah, those state-sponsored crews with ties to the PRC—pounced on this React Server Components flaw hours after disclosure on December 5. Wiz reports opportunistic waves slamming Next.js apps in Kubernetes clouds, probing Taiwan, Uyghur regions, Vietnam, Japan, New Zealand hardest, but don't sleep on US hits: .gov sites, academic labs, even a uranium import authority got selective love. Palo Alto's Unit 42 confirms exploitation for remote code execution via unsafe deserialization. CISA's screaming: patch to React 19.0.1, 19.1.2, or 19.2.1 now, scan for indicators, segment networks, and report incidents stat.

But wait, there's more heat from BRICKSTORM, the stealthy backdoor CISA and Canada's Cyber Centre unpacked on December 4. WARP PANDA, that slick China-nexus squad with cloud wizardry, deploys it on Windows and VMware vCenter/ESXi for eternal persistence in IT and government sectors. It masquerades in legit traffic, yoinks files, self-heals if disrupted—CrowdStrike's on it, linking to US entity breaches since April 2024. Madhu Gottumukkala, CISA's Acting Director, nailed it: these actors embed for sabotage. Immediate moves? Hunt IOCs, inventory edge devices, enforce Cross-Sector Cybersecurity Performance Goals, and isolate if found.

Sectors under fire: critical infrastructure like energy and gov tech, with React2Shell eyeing nuclear ops. No brand-new malware in the last day, but BRICKSTORM's echoes linger, and UK's December 9 sanctions on i-Soon and Integrity Tech for reckless US/UK hits underscore the pattern—China's embassy called it "pot calling kettle black," but we're not buying.

Defensive playbook from CISA: patch React2Shell yesterday, audit VMware for BRICKSTORM, enable EDR, segment like your data's life depends on it—because it does. Huntress warns of Gladinet hard-coded keys from December 11 bleeding into this, opening RCE doors on nine orgs already.

Folks, stay vigilant—China's cyber game is OPSEC-tight and relentless. Thank you for tuning in, and hit subscribe for daily drops. This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
...more
View all episodesView all episodes
Download on the App Store

China Hack Report: Daily US Tech DefenseBy Inception Point Ai