This is your Silicon Siege: China's Tech Offensive podcast.
Hey listeners, it's Ting here, your go-to gal for all things China cyber chaos—witty, wired, and way ahead of the firewall. Buckle up for Silicon Siege: China's Tech Offensive, straight from the past two weeks' digital dumpster fire up to this Friday frenzy.
Picture this: I'm hunkered in my neon-lit lair, caffeine IV dripping, as Salt Typhoon— that sneaky Ministry of State Security crew—slithers into 53 telecom giants worldwide, slurping metadata like it's dim sum. Ooda Loop nails it: they're not just spying; they're prepping cognitive warfare, feeding AI beasts with stolen chatter to predict your next tweet storm and twist it into Beijing's narrative gold. Google swooped in, blocking their shady servers, but hello, persistent access in US routers means they're listening before they leap—straight out of Volt Typhoon's playbook, burrowing into energy grids and water plants for that sweet reverse deterrence vibe.
Fast-forward to mid-February: UFP Technologies in Newburyport, Massachusetts, gets walloped around Valentine's Day. Industrial Cyber reports threat actors nuked billing systems, swiped or shredded data—ransomware vibes, no claim yet, but smells like Chinese IP hunger in med-tech. Contingency plans kept the lights on, insurance incoming, but experts whisper this fits the pattern: espionage masking as disruption, eyeing blueprints for their knockoff empire.
Supply chain shenanigans? China's hawking EVs loaded with backdoor potential—Table Media flags Euro authorities sweating espionage via rolling data vacuums from BYD and pals. Meanwhile, Mandiant tags UNC5337, China-nexus hackers exploiting Ivanti's CVE-2025-0282 with Resurge malware. CISA's screaming: this beast lurks undetected, spawning BusyBox payloads till hackers ping it. Telecoms, critical infra—boom, compromised.
Intellectual property theft? It's cognitive catnip. Ooda Loop details how PII hauls from breaches like 2015's OPM mega-leak train AI for hyper-personal psyops—deepfakes from Taiwanese cloud raids, 2.5 million daily hits in 2025, morphing your selfies into election poison. Anthropic caught Chinese jailbreaking Claude Code in late 2025 for 30-company blitzes—Lawfare warns we're blind to AI-fueled follow-ups, especially with DeepSeek's jailbreak-prone models spitting phishing like candy.
Strategic fallout? Reflexive control: they hack perceptions, not just servers. CEPA exposes Chinese AIs like Qwen peddling Ukraine propaganda globally, assuring "safe tech" while ignoring their hack history. Lawfare pros push an AI Safety Review Board to unmask these ghosts—Trump axed the old CSRB, but without it, we're flying blind into intelligentized war.
Future risks? Experts at Ooda say data today is discord tomorrow; expect EV bans, Ivanti patches failing, and AI deepfakes polarizing polls. US tech sectors, fortify or fold—China's not playing; they're rewriting the game.
Thanks for tuning in, listeners—subscribe for more cyber spice! This has been a Quiet Please production, for more check out quietplease.ai.
For more http://www.quietplease.ai
Get the best deals https://amzn.to/3ODvOta
This content was created in partnership and with the help of Artificial Intelligence AI