Cyber Sentinel: Beijing Watch

Salt Typhoon Storm: Chinese Hackers Feast on US Telecom Giants


Listen Later

This is your Cyber Sentinel: Beijing Watch podcast.

Hey listeners, Ting here on Cyber Sentinel: Beijing Watch, your go-to for the pulse-pounding world of Chinese cyber ops hitting U.S. security. Strap in—this week's been a Salt Typhoon storm, with Beijing's hackers burrowing deeper into our telecom backbone.

Picture this: I'm staring at my screens, caffeine-fueled, as Senator Mark Warner drops the bomb at a Defense Writers Group event. Salt Typhoon—that slick Chinese state-sponsored APT tied to the Ministry of State Security—has been feasting on U.S. telecom giants like AT&T and Verizon for over two years. They're not just peeking; they're inside, slurping unencrypted calls and texts from politicians, celebs, and you name it. Warner says they're "still inside," despite FBI briefings claiming networks are "pretty clean." Conflicting intel? Classic fog of cyber war. Huntress labs confirm it: these ghosts exploit Cisco and Palo Alto vulns, "live off the land" with native tools, steal creds via TACACS+ sniffing, and tunnel out via GRE and IPsec. Targeted industries? Telecom first, but power grids next—Chinese-made inverters in U.S. utilities are ticking hack bombs, per recent reports.

New tricks? AI supercharging the espionage. Anthropic busted a Chinese op using AI to automate hacks on 30 targets—small now, but scaling fast for drone swarms and targeting algos. And get this: President Trump just greenlit Nvidia's H200 AI chips—six times beefier than the H20s—to ship to China, snagging 25% of sales. TechXplore calls it a security-to-trade pivot, fueling PLA's autonomous weapons while we hand over the keys. Dual-use nightmare: those chips train chatbots today, guide missiles tomorrow.

Attribution? Ironclad—NSA, CISA, FBI point to MSS puppets like Sichuan Juxinhe Network Tech, hit with Treasury sanctions and a $10 mil bounty. China denies it, but David R. Shedd's book "The Great Heist" lays out three decades of IP theft in chips, telecom, military gear. International responses? Patchy—FCC rescinded some rules, allies like Australia sweat AUKUS alignment as U.S. goes transactional. Russia? Copycatting Salt Typhoon vulns already.

Tactical hit: Immediate data exfil, counterintel on our spooks. Strategic? Erodes tech edge, preps for SCS flare-ups or Taiwan chaos. Recommendations? Patch KEV vulns yesterday—Cisco routers, Ivanti VPNs. Zero trust networks, segment everything, monitor logs for rogue tunnels. Encrypt comms, ditch Chinese inverters, push Warner's telecom standards bill despite the billion-dollar whine.

Listeners, stay vigilant—Beijing's playing 4D chess while we're patching holes. Thanks for tuning in to Cyber Sentinel: Beijing Watch—subscribe now for the unfiltered truth! This has been a Quiet Please production, for more check out quietplease.ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
...more
View all episodesView all episodes
Download on the App Store

Cyber Sentinel: Beijing WatchBy Inception Point Ai