This is your Dragon's Code: America Under Cyber Siege podcast.
Hey listeners, Ting here, your go-to cyber sleuth with a front-row seat to China's digital dragon dance. Picture this: it's been a wild week ending February 15, 2026, and America's infrastructure is under siege from the slickest Chinese ops yet—think Dragon's Code, a relentless cyber storm hitting defense and critical grids. I'm diving straight in, no fluff.
Over the past days, groups like APT5, aka Keyhole Panda or Mulberry Typhoon, and UNC3236, better known as Volt Typhoon, have been feasting on North American defense contractors and research labs. Rescana's latest intel nails it: these crews exploited edge devices—those sneaky IoT gadgets on the network fringes—with custom malware like INFINITERED and ARCMAZE obfuscation tricks. They layered on Operational Relay Box networks, or ORBs, blending legit traffic with malicious payloads to ghost past geofencing and EDR tools. Supply chains? Hammered. Think compromised partners feeding intel straight to Beijing, targeting battlefield management systems and semiconductor firms. Google’s Threat Analysis Group and Mandiant pinned this squarely on Chinese state-sponsored actors, with TTPs screaming persistence: spearphishing laced with AI-refined lures, credential dumps, and encrypted C2 channels.
Affected systems? Oof—energy grids, water facilities, transportation hubs, even US Treasury echoes from last year's BeyondTrust zero-day mess by China-nexus hackers. Brussels Morning reports Washington buzzing with feds warning of AI-automated intrusions scanning vast networks in real-time, poisoning defense AI models for chaos. A Department of Homeland Security bigwig spilled: "The scale and speed demand new defenses." Attribution? Rock-solid—US sanctions on China-based crews targeting crit infra, per Treasury alerts, plus UNC3886's deep probes into Singapore telcos like Singtel and StarHub, a blueprint for US hits.
Defenses kicked in hard: multi-layered EDR from Ivanti's 2026 report, network segmentation, and relentless patching—Microsoft's February Patch Tuesday squashed six zero-days, while BeyondTrust rushed CVE-2026-1731 fixes amid active exploits. Public-private pacts ramped up resilience, with redundant systems and threat hunting. Experts like Rescana urge auditing edge access and faking out "Dream Job" scams.
Lessons? Attackers wield AI for speed—we're still in meetings, says Ivanti. Cybersecurity advisor nailed it: "Innovation without security is instability." Bolt down supply chains, train humans, and go international—Washington's pushing AI governance at APEC amid China rivalry.
Whew, listeners, stay vigilant—that dragon's code evolves fast. Thanks for tuning in—subscribe for more cyber tea! This has been a Quiet Please production, for more check out quietplease.ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
This content was created in partnership and with the help of Artificial Intelligence AI