1. EachPod

Scandalous! China's Cyber Soldiers Caught Red-Handed: Hacking Bonanza Targets Telecoms, Google & More!

Author
Quiet. Please
Published
Thu 05 Jun 2025
Episode Link
https://www.spreaker.com/episode/scandalous-china-s-cyber-soldiers-caught-red-handed-hacking-bonanza-targets-telecoms-google-more--66411072

This is your Digital Dragon Watch: Weekly China Cyber Alert podcast.

Hello cyber defenders! Ting here with your Digital Dragon Watch alert. Hold onto your keyboards because China's cyber operations have been particularly aggressive this past week.

Breaking just today, Guangzhou's public security bureau has issued bounties for over 20 hackers they claim are linked to Taiwan. This unusual public announcement suggests escalating tensions in the digital battlespace between mainland China and Taiwan.

Meanwhile, the notorious APT41 group has been getting creative, exploiting Google Calendar as an attack vector in their latest campaign. Google Threat Intelligence spotted this China-based operation just last week, turning Google's own productivity tools against targets. Clever, but concerning.

Speaking of concerning, let's talk about Salt Typhoon - a China-backed threat group that's been on a telecom hacking spree. According to Recorded Future's Insikt Group, they've compromised five more telecom providers globally, including two U.S.-based companies. Their method? Exploiting unpatched Cisco edge devices, targeting vulnerabilities that were disclosed back in October 2023. Among their targets were several American universities including UCLA and California State University.

Perhaps most alarming is what EclecticIQ researchers discovered about critical infrastructure attacks. In April, Chinese state-backed hackers launched high-tempo exploitation campaigns targeting SAP NetWeaver Visual Composer through a nasty file upload vulnerability that allows remote code execution. The attackers even left an exposed directory on their infrastructure containing detailed logs of their activities - sloppy tradecraft that helped analysts link these intrusions to known Chinese cyber-espionage units including UNC5221 and UNC5174.

This comes after February reporting showed Chinese cyber espionage operations surged by a staggering 150% in 2024, with attacks against financial, media, and manufacturing sectors rising up to 300%.

For protection, security experts recommend:
1. Prioritize patching Cisco edge devices and SAP NetWeaver systems immediately
2. Implement enhanced monitoring for Google Calendar-based attacks
3. Conduct threat hunting specifically looking for indicators associated with Salt Typhoon and APT41
4. Segment critical infrastructure networks to limit lateral movement

The pace and sophistication of these attacks indicate China's cyber units are operating with increased confidence and technical capability. Stay vigilant, keep your patches current, and remember - in the cyber battlefield, awareness is your strongest shield.

This is Ting signing off until next week. Keep your firewalls hot and your zero-days cold!

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

Share to: