Digital Dragon Watch: Weekly China Cyber Alert

China's Cyber Storm Surges! Hacks, Smishing & Espionage Explode as US-China Tech Tussle Boils


Listen Later

This is your Digital Dragon Watch: Weekly China Cyber Alert podcast.

Welcome back, listeners—Ting here with your weekly blast of caffeinated code and straight-up drama from the world of China cyber. Let’s skip the fanfare and jump headfirst into the bytes: it’s Digital Dragon Watch, and if you thought the last seven days would bring calm, guess again.

First up, DDoS attacks across the Asia-Pacific region have absolutely mushroomed, with China standing in the center of the storm. StormWall experts reported a 116% surge compared to this time last year. Their data shows government agencies, telecom giants, and financial institutions are getting hammered, with one 2.3 terabit-per-second attack being the stuff of cyber legend. What’s scarier? Probing assaults—mini scans, the hacker’s pre-game warmup—went up by 3,500-fold, with China shouldering 22% of all attacks. Ramil Khantimirov called this the most challenging DDoS threat landscape ever, and the fact that botnet power is quadrupling means defenders are playing chess against AI grandmasters powered by crowds of zombie devices.

But that’s not all, folks. Last Wednesday, the Cyberspace Administration of China dropped the mother of compliance updates: the National Cybersecurity Incident Reporting Management Measures. Coming into force next week, these new rules finally yank the patchwork of incident-reporting obligations into something resembling order. Every network operator in China—from social media kingpins to scrappy startup cloud hosts—now faces stricter, unified standards, with clear technical criteria and centralized channels for reporting. This harmonization is huge. If you’re doing business in China, the era of guesswork is over. Miss an incident and you’ll be sweating under CAC’s gaze.

Meanwhile, espionage is getting stickier. APT group Earth Estries (yes, I see you) has expanded global reach using old-school persistence and new tactics to siphon government, research, and telecom secrets. Brandefense’s threat sheet spotlights their adaptability—even if their tools aren’t bleeding-edge, they compensate with relentless campaigns and strategic alignment to Beijing’s goals. Defensive moves? Patch anything facing the internet, lock down on phishing, and keep eyes out for sneaky DNS tricks or unauthorized VPN logins. Don’t get blindsided by scheduled task weirdness or web shells in the basement of your infrastructure.

On the user-targeted front, ongoing smishing campaigns—think text-message phishing—have been burning since early last year, with threat actors leveraging nearly 200,000 domains in scams. They’re impersonating everything from delivery apps to government portals, trying to snatch credentials and financial data with scary efficiency.

Zooming out for government response, reports from the Foundation for Defense of Democracies reveal progress but warn of big fragilities: the US still faces leadership gaps at CISA and the State Department's Bureau of Cyberspace and Digital Policy, which we absolutely need staffed up ASAP. Sean Cairncross, America’s cyber czar, says deterrence is working, but adversaries—especially China—aren’t feeling enough pain to stop. One remedy? More authority for the Office of the National Cyber Director and sustainable multi-year funding for CISA. Meanwhile, the Cyber Diplomacy Act and allied funding have helped keep Chinese firms from dominating core tech supply chains abroad—think HarmonyOS nudging out American operating systems in Shenzhen.

And the cyber tit-for-tat is heating up. As of today, China’s Ministry of Foreign Affairs loudly accused the NSA of sophisticated cyberattacks against the national time system. This mutual finger-pointing, amplified by export controls and local bans, only deepens U.S.–China tech decoupling and sharpens the risk of retaliatory action from both sides.

Experts say don’t wait for the breach—start continuous monitoring of the dark web, keep your backups up to date and offline, and drill your teams with realistic phishing simulations. Eliminate persistence by running full compromise assessments, and when in doubt, bring in cyber response pros before you start any backchannel ransom negotiations.

That’s your digital intel drop for this week. Thanks for tuning in to Digital Dragon Watch—subscribe now, because next week will be even wilder. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
...more
View all episodesView all episodes
Download on the App Store

Digital Dragon Watch: Weekly China Cyber AlertBy Inception Point Ai