Dragon's Code: America Under Cyber Siege

Volt Typhoon Strikes! Is Your Network Raccoon-Proofed for Chinas Cyber Siege?


Listen Later

This is your Dragon's Code: America Under Cyber Siege podcast.

Listeners, it’s Ting, your expert cyber sleuth—and today I am deep in Dragon’s Code: America Under Cyber Siege. Buckle up, because the last few days have been wild in the digital underbelly of US infrastructure.

Let’s cut to the chase—Chinese cyber operations have leveled up yet again. The name every expert can’t stop saying is Volt Typhoon, and trust me, you do not want them in your networking closet. CISA Director Jen Easterly warned this week that what you’ve seen is merely the “tip of the iceberg.” She says China isn’t just after espionage anymore—they’re prepping to wreak havoc if a crisis erupts, especially over Taiwan. Their objective is disruption: pipeline shutdowns, water systems offline, trains stopped cold, telecom chaos that would make your Grandma’s landline nostalgic. Not a drill, folks.

The methodologies are downright crafty. We’re talking *living off the land attacks*: Volt Typhoon burrows in, blending with normal network traffic, exploiting legitimate admin tools like PowerShell and WMI. They avoid traditional malware—so classic antivirus is useless—and focus on persistence. Salt Typhoon is another favorite: after six months, Chinese spies are still lingering inside US telecom systems, according to the Cyber Initiatives Group. That means backdoors remain, and kicking them out has been like, well, trying to evict a raccoon from your attic during mating season.

But that’s not all. Advanced Persistent Threat 41—yes, APT41—popped up with a fresh trick this week, targeting US trade negotiation strategies. The Wall Street Journal exposed their malware-laced email campaign, designed to dupe trade groups and law firms into opening attachments that’d let hackers snoop on US-China trade deals. Not subtle, but unfortunately, very effective. FBI and Capitol Police are actively investigating.

Let’s talk targets. From water treatment plants to solar panel management software, power grids, and even port cranes—Chinese influence runs deep. Eighty percent of US port cranes are made in China and potentially rigged for remote shutdown. Even stranger: New York SIM farms run by Chinese entities, ready to disrupt telecom on demand. Grant Newsham, a seasoned Marine and China watcher, pointed out that besides virtual hacks, physical assets and even proxies—hello, Chinese truckers and “police” service centers—are scattered across the American heartland, adding layers to the siege.

Attribution is always slippery. Chinese officials, predictable as a WeChat meme, denied everything, saying they “firmly oppose cybercrime.” Meanwhile, evidence from digital forensics, unique code patterns, infrastructure links, and behavior profiling has left experts in little doubt—these operations bear all the hallmarks of groups run by China’s Ministry of State Security.

How do you defend against this? Easterly and her team are layering in zero trust models, rapid incident response, and asset segmentation. The US government and private sector are forced to share threat intelligence faster via platforms like JCDC and increasing tabletop exercises. FBI’s Mara Taylor says “co-location” of cyber analysts—basically shoulder-to-shoulder collaboration—is speeding up response times, but the challenge remains: rooting out deeply embedded adversaries who don’t play by rulebook.

Lessons learned? First, the adversary isn’t just outside your firewall—they are inside, hiding behind your own tools. Second, defense isn’t just technical—it’s human. China is amplifying “honey-trap” ops, recruiting Americans through targeted relationships at tech conferences, aiming to siphon intellectual property. According to Robert Lansing Institute, US agencies now warn even scientists and startup founders: beware that overly friendly investor with a Foshan accent.

So, what’s next? Cybersecurity experts like Grant Newsham urge a radical rethink of homeland defense—the current playbook is “a day late and a dollar short.” Layer tech and human defenses, expand real-time monitoring, and don’t just test your backups, check if your night shift janitor is a member of Shenzhen’s badminton club.

Listeners, thanks for tuning in to Dragon’s Code. If you want more high-voltage cyber intrigue, subscribe now for alerts and insider breakdowns. This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

This content was created in partnership and with the help of Artificial Intelligence AI
...more
View all episodesView all episodes
Download on the App Store

Dragon's Code: America Under Cyber SiegeBy Inception Point Ai