China Hack Report: Daily US Tech Defense

Silk Typhoon Hacker Nabbed in Milan: US Cyber Dragnet Snags Chinese Suspect


Listen Later

This is your China Hack Report: Daily US Tech Defense podcast.

Hey listeners, Ting here with your China Hack Report: Daily US Tech Defense for July 13th, 2025. No time for banter—let’s plug straight into the matrix because the cyber wires have been electric in the last 24 hours.

First, the big headline: Italian police nabbed Zewei Xu, a 33-year-old Chinese national, at Milan’s Malpensa Airport on a US warrant. Xu’s not your average tourist, unless you count silk and typhoons as travel bags. He’s tied to the Silk Typhoon hacking group, also known as Hafnium, which the FBI suspects of targeting everything from COVID-19 vaccine research at the University of Texas to thousands of email accounts in a mass phishing blitz. His group reportedly vacuumed up sensitive US government and intellectual property data. US officials say Xu could spend decades behind bars if extradited. The arrest flashes a giant warning sign to international and state-backed hackers: you can run global, but you can’t hide forever thanks to international teamwork.

Now, malware watch. The last day saw researchers spot infostealers hitching a ride on the leaked Shellter red teaming tool. Elastic Security Labs highlighted several malware campaigns capitalizing on this leak—so if your pen-testing kit is acting funny, check for unwanted stowaways. On the supply chain front, evidence emerged of malware sneaking into a popular GravityForms plugin, raising red flags for anyone running business forms or customer portals. Stay sharp—these aren’t theoretical threats.

In terms of sector targeting, the legal field took a direct hit: suspected Chinese hackers broke into email accounts at a powerful DC law firm, targeting attorneys and advisers. Law firms hold goldmines of sensitive data, so every incident like this is a reminder to double—and triple—lock your digital front door.

Critical infrastructure, always a cyber bullseye, just dodged—or maybe stepped on—a decades-old bullet. CISA released a public advisory after a 13-year-old vulnerability in the End-of-Train (EoT) modules used in US trains finally got attention. Turns out, with less than $500 in hardware, anyone could have manipulated braking systems on freight trains coast-to-coast. US rail operators have dragged their feet for over a decade, but with CISA’s spotlight, fixes are inching forward—safety can’t be an afterthought.

And if you run any of the following: Citrix NetScaler ADC/Gateway, Multi-Router Looking Glass, PHPMailer, Ruby on Rails, Synacor Zimbra, or Google Chromium, CISA just shoved these flaws into its Known Exploited Vulnerabilities catalog. The marching orders: patch now, don’t procrastinate, especially for CitrixBleed 2 and Google Chromium’s V8 flaw. Microsoft’s July Patch Tuesday also squashed 130 bugs, including an SQL Server zero-day. If your IT team’s still sipping their matcha, tell them to hit update.

CISA’s latest advisory on cloud systems reminds us: the attack surface is exploding. More connections, more vulnerabilities, and, yes, more opportunities for Chinese-linked APTs to sneak in via cloud misconfigurations or outdated dependencies. Don’t assume your vendor’s got your back—verify, audit, and patch.

That’s a wrap for this charged-up edition. Thanks for tuning in to China Hack Report. Don’t forget to subscribe for daily defenses—this has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta
...more
View all episodesView all episodes
Download on the App Store

China Hack Report: Daily US Tech DefenseBy Quiet. Please