This is your Digital Dragon Watch: Weekly China Cyber Alert podcast.
Hey listeners, Ting here with Digital Dragon Watch, your weekly China cyber alert hotter than a Sichuan hotpot. Over the past seven days ending February 11, 2026, China's hackers have been flexing like it's Olympic season, but with more zero-days and less fair play.
Kicking off with the big breach down under—well, Singapore, actually. The Cyber Security Agency of Singapore just dropped that Chinese espionage crew UNC3886 infiltrated all four major telcos: M1, SIMBA Telecom, Singtel, and StarHub. These sneaky foxes used zero-days in firewalls and rootkits for persistence, swiping technical data last year but no customer info, thank goodness. CSA spent 11 months evicting them, per their official report. Google Threat Intelligence echoes this, noting UNC3886's love for edge devices in defense industrial base hits, topping espionage volume against US aerospace and contractors over two years.
Then there's leaked docs from Recorded Future revealing China's "Expedition Cloud" platform, where PLA types rehearse smashing critical infrastructure of South China Sea and Indochina neighbors—like virtual dry runs for blackouts and chaos. Chilling prep work, straight from the source code cache.
Ransomware front? ReliaQuest pins China-linked Storm-2603, tied to Warlock ops, exploiting SmarterMail's CVE-2026-23760 for admin takeovers. They chain it with Velociraptor for C2—legit DFIR tool turned evil twin—and MSI payloads from Supabase. No full encrypt yet, but it's staging for pain, hitting email servers ripe for probing.
Targeted sectors? Telecoms, defense supply chains, manufacturing—anywhere edge gear like Ivanti or Fortinet lurks. UNC3886 and kin hit unmanned aircraft firms and R&D for IP theft. Norway's NSM confirmed China-linked espionage as their top 2026 threat, per Scandasia.
US response? Trump's 2026 National Defense Strategy eyes China economically, pushing alliances and "strategic stability" talks with PLA to avoid Xi Jinping summit fireworks in April. In Bangladesh, Ambassador Brent T. Christensen warned of China risks, pitching US gear over drone factories near India's border and Pakistan's China-co-built JF-17 jets. CYBERCOM nominee Rudd prioritizes China ops review for homeland defense. Google's GTIG flags sustained China pressure on DIB.
New vectors: Edge exploits, rehearsed infra attacks, SmarterMail resets. Expert recs? Patch Ivanti, Fortinet pronto—Patch Tuesday hit those hard. Segment edges, hunt Velociraptor anomalies, and air-gap rehearsals if you're near the Dragon's turf. Multi-factor everything, and scan for Expedition-like sims.
Stay vigilant, listeners—China's cyber game is marathon, not sprint. Thanks for tuning in to Digital Dragon Watch; subscribe now for the edge. This has been a Quiet Please production, for more check out quietplease.ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
This content was created in partnership and with the help of Artificial Intelligence AI