1. EachPod

Silk Typhoon Hits US Defenses Citrix Bleeds Vishing Spikes and Radiology Records Swiped

Author
Quiet. Please
Published
Mon 14 Jul 2025
Episode Link
https://www.spreaker.com/episode/silk-typhoon-hits-us-defenses-citrix-bleeds-vishing-spikes-and-radiology-records-swiped--66977445

This is your Red Alert: China's Daily Cyber Moves podcast.

Hey listeners, Ting here—your cyber sleuth in sneakers, bringing you the latest spin from the digital battlefield! If you’ve been busy doomscrolling or chasing summer BBQs, you missed the fireworks that just exploded on the US–China cyber front. Buckle up, because in the past 72 hours, Red Alert didn’t even start to cover it.

Right out of the gate, CISA and the FBI went DEFCON-Orange after a sudden burst of “Silk Typhoon” attack patterns. These are fresh, and they aren’t just quirky nicknames. We’re talking about highly sophisticated malware laced into US federal and defense contractor networks. The word on the wire from SentinelOne is that reconnaissance and privilege escalation—my favorite cyber party tricks—were detected targeting at least 17 defense-related networks plus major transportation grids. Not your grandma’s ransomware. These are pre-positioning campaigns, like chess moves ahead of a larger play, and yes, the pieces are already on American soil.

By Saturday afternoon, emergency alerts started popping up every two hours. CISA urged every agency running Citrix NetScaler to patch immediately, citing the CitrixBleed 2 vulnerability. Apparently, Chinese-linked threat actors are actively exploiting this hole to harvest credentials at scale. If you haven’t patched, let’s just say: don’t wait for your system to become a case study in next week’s Red Alert episode.

Meanwhile, the FBI confirmed that not only government agencies but also energy infrastructure, regional power grids, and even food distribution logistics were hit by new variants of remote code execution exploits—think CVE-2025-47812 and friends. Imagine hackers controlling everything from your email servers to the supply chain of your local pizza joint. Not cool, unless you like your pepperoni with a side of cyber chaos.

Around noon today, a special bulletin went out: Crowdstrike, working alongside the Bureau, discovered coordinated attacks leveraging AI-powered social engineering. This isn’t just phishing—it’s “vishing” and deepfake calls to IT helpdesks, up 442% in 2024 according to the Global Threat Report. That means the Chinese groups have leveled up from stealing passwords to manipulating real people into opening virtual doors. Combine that with their ongoing exfiltration of sensitive medical records—did I mention a hospital system in Florida had its radiology database “borrowed” last night?—and it’s a multi-front siege.

All this comes as Washington slashes cyber defense budgets while doubling down on offensive hacking ops, daring China to escalate. Experts fear retaliation is now a matter of when, not if. My advice to you? Get multi-factor authentication up, keep those critical systems patched, and rehearse your incident response—because if escalation happens, you don’t want to play catch-up after the fact.

That’s the frontline update from Ting, your favorite cyber detective. Thanks for tuning in to Red Alert: China’s Daily Cyber Moves—don’t forget to subscribe, and keep those firewalls spicy! This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

Share to: