This is your Dragon's Code: America Under Cyber Siege podcast.
Dragon’s Code is humming this week, listeners, and I’m Ting, your friendly neighborhood China-and-cyber nerd, here to walk you through how America just spent seven days under quiet, methodical digital siege.
Let’s start where it hurts: U.S. critical infrastructure. According to the Cybersecurity and Infrastructure Security Agency and the NSA, Chinese state-sponsored operators tied to groups like Warp Panda and UNC5221 have been living inside VMware vSphere and vCenter environments using a custom Go-based backdoor called BrickStorm. CISA reports they sat inside one U.S. network from April 2024 all the way to September 2025, owning vCenter, domain controllers, and an ADFS server, even exporting cryptographic keys. That’s not a smash-and-grab; that’s pre-positioning for turning off the lights when geopolitics get spicy.
The attack methodology is pure “quiet dragon.” BrickStorm blends into normal traffic using DNS-over-HTTPS, masquerades as vCenter processes, and in some samples even acts as a SOCKS proxy so they can pivot deeper. Security strategist Gabrielle Hempel at Exabeam warns that once an adversary owns your hypervisor, your EDR and SIEM go basically blind, because the attacker is above the operating system, not inside it.
Attribution isn’t just vibes and Mandarin-speaker stereotypes. The government advisory ties the implants, infrastructure, and tradecraft to known PRC state-linked clusters, and AWS Security backs this up in a separate report by noting that many of the same anonymization networks and IP ranges show up again in a different campaign: the React2Shell frenzy.
React2Shell, formally CVE-2025-55182, is a critical remote code execution flaw hitting React and Next.js stacks. Amazon’s CISO C.J. Moses says Chinese state-nexus actors were hammering it within hours of public disclosure, using AWS’s MadPot honeypots as their playground. TechRadar and GovInfoSecurity report multiple China-based teams, including Earth Lamia and Jackpot Panda, rapidly grabbing public proof-of-concept code, then chaining React2Shell with other N-days in broad, automated campaigns against finance, logistics, retail, IT providers, and universities. One unattributed China-linked cluster even spent nearly an hour manually debugging live exploitation attempts, which is the hacker equivalent of pair-programming your own zero-day party.
Meanwhile, Security Boulevard and daily cyber briefings note a spike in Chinese-origin brute-force and credential-stuffing against Palo Alto GlobalProtect VPN portals. No exotic zero-day here—just massive password-sprays and MFA fatigue attacks, then lateral movement and data theft once someone reuses “Summer2024!” on a critical gateway.
Defensively, it’s been all hands on deck. CISA and NSA pushed detailed indicators of compromise and BrickStorm signatures, urging operators to isolate management consoles, strip public IP exposure from vCenter, hunt for rogue local admins and weird scheduled tasks, and rotate federation keys. AWS rolled out Sonaris active defense, WAF managed rules, and extra perimeter controls around React2Shell, while still basically yelling: “Patch, don’t pray.” On the policy side, the new National Defense Authorization Act shovels billions into U.S. Cyber Command and broader DoD cyber operations, and orders harmonized requirements for defense contractors—because none of this works if your power grid runs on unpatched lab gear and hope.
The lessons? First, China isn’t just stealing intellectual property anymore; it’s shaping the battlespace. Critical infrastructure is the new high ground. Second, speed is the battlefield: they operationalized React2Shell within hours; most enterprises still schedule patching for “next quarter.” Third, hypervisor-layer attacks mean defenders have to monitor the control plane, not just endpoints—think vCenter logs, configuration drift, and out-of-band integrity checks. And finally, attribution is now a team sport: government advisories, cloud telemetry from Amazon, and insights from experts like Gabrielle Hempel and Jon Baker at AttackIQ all stitched this week’s dragon tracks together.
I’m Ting, and this has been Dragon’s Code: America Under Cyber Siege. Thanks for tuning in, and don’t forget to subscribe so you don’t miss the next breach autopsy.
This has been a quiet please production, for more check out quiet please dot ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
This content was created in partnership and with the help of Artificial Intelligence AI