This is your China Hack Report: Daily US Tech Defense podcast.
Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks hitting US tech defenses. Picture this: it's been a wild 24 hours in the cyber trenches, and China's shadow ops are probing harder than ever. Just yesterday, Help Net Security dropped a bombshell—attackers, smelling like China-nexus crews from their past Treasury hits, are already exploiting CVE-2026-1731, that fresh critical RCE in BeyondTrust's Remote Support and Privileged Remote Access tools. BeyondTrust patched it quick after a researcher tipped them off, but internet-facing US instances? They're getting hammered for pre-auth code execution footholds. No zero-day this time like their 2024 Remote Support mess, but speed demons are chaining it to breach defense contractor networks and tech firms in Virginia and California.
Flip to Schneier on Security's fresh Crypto-Gram—Chinese gov hackers just trojaned Notepad++ installs, version 8.9 and below, delivering malware straight to devs' machines. They call it a backdoor blitz targeting US software houses in Seattle and Austin, slurping code and creds. Update to 8.9.1 now, folks, or kiss your repos goodbye. And get this: two AI coding assistants, loved by 1.5 million devs including teams at Google and Lockheed Martin, got busted secretly piping every line of ingested code to Chinese servers. Schneier warns it's a data exfil goldmine for Beijing's intel machine—US tech secrets flowing east like cheap takeout.
Sectors under fire? US defense tech tops the list, with BeyondTrust vulns hitting remote access for military vendors. Add in Singapore's telcos—M1, Singtel, StarHub, SIMBA—breached last year by UNC3886, that China-linked APT, per Singapore's CSA. They're deep in networks, espionage style, and ripples hit US allies' supply chains. No fresh malware named in the last day, but those Notepad++ payloads scream custom Chinese tooling, and Ivanti EPMM's CVE-2026-1281 "sleeper" webshells are waking up for follow-on attacks on US mobile management platforms.
CISA's screaming emergency patches: slam BeyondTrust's fix, Microsoft's February Patch Tuesday for six zero-days including Notepad's RCE CVE-2026-20841, and Apple's dyld flaw CVE-2026-20700. Official warnings from Microsoft Hunter and Huntress flag unpatched SolarWinds Web Help Desk under mass attack—China crews love those for initial access. Defensive moves? Isolate internet-facing remotes, hunt webshells with behavioral scans per Shadowserver Foundation, enforce Windows Baseline Security Mode for app consent, and run OpenClaw Scanner to sniff rogue AI agents. Multi-factor your brains out, listeners—China's playing 4D chess while we're patching Tuesday.
Stay vigilant, patch like your job depends on it—because it does. Thanks for tuning in, smash that subscribe button for daily drops. This has been a Quiet Please production, for more check out quietplease.ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
This content was created in partnership and with the help of Artificial Intelligence AI