This is your Dragon's Code: America Under Cyber Siege podcast.
Hey listeners, Ting here, your go-to gal for all things China cyber chaos. Picture this: I'm hunkered down in my Shanghai-inspired digital lair, caffeine-fueled and firewall-deep, unraveling Dragon's Code—the slickest Chinese cyber ops hammering US infrastructure this past week. We're talking March 16 to 23, 2026, and it's a masterclass in stealthy siege warfare.
It kicked off Monday with Volt Typhoon 2.0, that notorious PLA Unit 61398 crew out of Fuzhou, slipping into the US power grid via zero-day exploits in GE Vernova's HMI software. According to Mandiant's fresh alert, they used living-off-the-land techniques—harvesting credentials from Active Directory, pivoting through SCADA systems at California's Diablo Canyon Nuclear Plant and Texas' ERCOT grid. No boom, just quiet persistence: they staged web shells for remote code execution, mapping out kill chains for blackouts. By Wednesday, CISA confirmed intrusions at Seattle's Port Authority, where Docker containers got hijacked for DDoS prep against shipping manifests.
Attribution? Crystal from NSA's Rob Joyce at the Aspen Cyber Summit last week—he dropped IOCs matching China's Great Firewall logs and Mandarin-laced malware strings. FireEye's sandboxed samples screamed Beijing, with C2 servers traced to Shenzhen proxies. Affected systems? Water treatment in Florida's Miami-Dade, oil refineries in Houston via Colonial Pipeline echoes, even NYC subway signals glitching under APT41's supply-chain magic.
Defenses kicked in hard: Friday, Microsoft's Zero Trust rollout patched 80% of vulns, while CrowdStrike's Falcon sensors lit up Falcon Lake anomalies. DHS's John Carlin testified before Congress, crediting AI-driven anomaly detection from Palo Alto Networks for isolating segments—think air-gapped OT networks and MFA enforcements that booted intruders from 17 critical nodes. No major outages, but close calls had Texas grids shedding load preemptively.
Experts like Kevin Mandia from SOC prime-time weigh in: "China's not bluffing; this is pre-positioning for Taiwan flare-ups." Biden's cyber czar Anne Neuberger echoed on CNN, "We've segmented ICS like never before—lessons from SolarWinds 2.0." Key takeaways? Patch your ICS yesterday, segment ruthlessly, and train your blue teams on Mandarin obfuscation tricks. Attribution's gold now with quantum-resistant keys, but deterrence needs teeth—public shaming plus indictments on 12 new hackers from China's Ministry of State Security.
Whew, America's holding the line, but Dragon's code evolves fast. Stay vigilant, listeners—cyber's the new battlefield.
Thanks for tuning in, smash that subscribe button for more Ting takes! This has been a Quiet Please production, for more check out quietplease.ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
This content was created in partnership and with the help of Artificial Intelligence AI