1. EachPod

China's Cyber Spies Hijack Diplomats, While US and Beijing Trade Cosmic Jabs

Author
Quiet. Please
Published
Mon 25 Aug 2025
Episode Link
https://www.spreaker.com/episode/china-s-cyber-spies-hijack-diplomats-while-us-and-beijing-trade-cosmic-jabs--67509961

This is your Digital Frontline: Daily China Cyber Intel podcast.

Ting here on the Digital Frontline, and if you’re tuning in for today’s China Cyber Intel daily briefing, you’re in the right place—let’s get straight into the hottest updates, because the threat landscape is anything but boring this week.

First up, Google’s Threat Intelligence Group just dropped a bombshell on an active campaign backed by a China-aligned crew known as UNC6384. They’re playing 4D chess with diplomats across Southeast Asia, but make no mistake, the tactics and tech are global and absolutely a concern for US interests. According to Patrick Whitsell at Google, these hackers have been hijacking web traffic using captive portal redirects. Imagine trying to log on to Wi-Fi and suddenly you’re funneled through a door where a so-called software update installs a backdoor called SOGU.SEC—no, that’s not an Adobe plug-in, it’s advanced malware living right in your device’s memory, making it sneaky and hard to spot.

And about their favorite tricks? Social engineering, valid code-signing certificates, in-memory payloads, and attacks that mimic legit software updates. Google’s advice to avoid being their next diplomat-in-distress: enable Enhanced Safe Browsing in Chrome, keep every device patched up, and please—I beg you—turn on 2-Step Verification for all your critical accounts.

While the Chinese are busy on the offensive, they’re also pointing fingers. Beijing has accused the US of leveraging a past flaw in Microsoft’s email servers to swipe military data and poke at Chinese defense sectors. It’s like a cyber blame game where everyone’s holding secrets and zero-days.

If you need a taste of physical world sabotage, look no further than the case of Davis Lu, a Chinese developer who got four years in US federal prison for planting malicious code, killing systems, and locking out colleagues at his Ohio employer. The good news is, for businesses: insider threats are finally being recognized as not just a risk, but a major disruptor.

Shifting to sector targeting, manufacturing took a big punch last week. On August 16, Data I/O, a key player in programming hardware for automotive and IoT, went offline after a ransomware attack that disrupted everything from shipping to communication. Experts say that supply chain tech and manufacturing remain juicy targets—so, no matter your role, segment access and regularly audit what runs on your critical systems.

Let’s not forget that cloud admins are still in the crosshairs. Mimecast researchers have flagged ongoing credential harvesting campaigns using Amazon email accounts to phish ScreenConnect administrators. This is especially dangerous because, once inside, the attackers can install their own remote management tools to spread ransomware further and wider. The tip here: check your permissions, use unique credentials, and double-down on phishing awareness training—EvilGinx and adversary-in-the-middle tricks are not going out of style any time soon.

Space might be the final frontier, but now it’s a hot cyber one. There’s increasing competitive rhetoric and, reportedly, cyber attacks targeting satellites—China and the US both posturing, each warning the other about militarizing the cosmos. Space Force says keeping satellites safe is on their must-do list.

Final lightning round of recommendations—update, segment, and monitor. Assume phishing is going to get through, so use defense in depth. Audit digital certificates—especially those from less-known issuers like Chengdu Nuoxin—and practice your incident response drills as if your backups depend on it.

That’s it for today’s Digital Frontline. I’m Ting, and I appreciate every one of you cyber sleuths for tuning in. Don’t forget to subscribe for more expert wit and the latest defense tips. This has been a quiet please production, for more check out quiet please dot...

Share to: