1. EachPod

Silicon Siege: China's Hacking Blitz Rocks US Tech Scene - Zero-Clicks, RATs & Talent Poaching Galore!

Author
Quiet. Please
Published
Mon 01 Sep 2025
Episode Link
https://www.spreaker.com/episode/silicon-siege-china-s-hacking-blitz-rocks-us-tech-scene-zero-clicks-rats-talent-poaching-galore--67583900

This is your Silicon Siege: China's Tech Offensive podcast.

You want details? Let’s jump in—because the last two weeks have been a wild ride in the world of cyber espionage, and Silicon Siege doesn’t even begin to describe it. I’m Ting, your walking, talking firewall against boredom, and this is your inside scoop on how China’s latest tech offensive is rolling through American industry like a denial-of-service attack at a pizza delivery app launch.

Let’s get right to the juiciest bit: Salt Typhoon, the Chinese state-sponsored hacking group, has been declared a national security crisis. The FBI, CISA, and a whole alphabet soup of international agencies revealed these guys have been targeting at least 200 U.S. companies, hacking across sectors like telecom, tech, and defense. AT&T, T-Mobile, Verizon—no one’s safe. Remember when Brett Leatherman from the FBI’s Cyber Division called Salt Typhoon “indiscriminate”? He wasn’t kidding. According to intelligence reports, these hackers have been funneling personal metadata, text messages, and even FISA selectors straight from the veins of our national internet backbone, thanks to supply chain attacks on routers and edge devices. Industry insiders say this is the “most extensive campaign seen in 2025.”

But Salt Typhoon wasn’t working solo. The Record from Recorded Future News noted three Chinese tech companies have been officially accused of supplying the Ministry of State Security and PLA with the cyber tools since 2021, literally enabling global surveillance. According to Kaspersky Lab, they’re using a souped-up RAT called Demodex to control servers—and then expertly wiping their footprints clean.

Not to be outdone, Chinese agents have gone after university research faster than you can say ‘intellectual property theft.’ The National Counterintelligence and Security Center just dropped a 40-page bombshell about talent recruitment—like China’s Thousand Talents Plan—poaching scientists and scooping up quantum, AI, energy, and semiconductor breakthroughs at major U.S. universities. Harvard, MIT, you name it: even top names have seen their researchers lured or—let’s be honest—recruited under the radar. And the “help” isn’t limited to grants—one unnamed university even took $500,000 from Huawei while applying for U.S. taxpayer-funded research. That’s some grade-A double-dipping.

Now, let’s talk about the zero-click era. Meta’s WhatsApp team, with backup from Amnesty International’s Security Lab and Infosecurity Magazine, just flagged a nasty exploit. Between August 8 and August 18, attackers chained a WhatsApp code bug (CVE-2025-55177) with a never-before-seen Apple image rendering flaw (CVE-2025-43300) to install spyware on iPhones—no user action required, literally. While WhatsApp users were patched, the campaign targeted high-profile U.S. tech sector folks, making it clear this wasn’t your everyday phishing scam.

Strategic implications? Experts like Jake Williams are blunt: the U.S. reluctance to go all-in on end-to-end encryption probably helped Salt Typhoon and friends. And with the second Trump administration disbanding the Cyber Safety Review Board, deep-dive threat analysis has been, well—null routed.

Looking forward, expect sanctions, more export controls, and maybe Congress asking why their emails are suddenly in Mandarin. If you’re a CISO or CIO tuning in, my advice: check those edge devices, deploy MFA everywhere, and make sure your Secure Boot isn’t just marketing lingo.

Thanks for tuning in to Silicon Siege—I’m Ting, here to encrypt your news feed! Subscribe for more, and remember: This has been a quiet please production, for more check out quiet please dot ai.

For more http://www.quietplease.ai


Get the best deals https://amzn.to/3ODvOta

Share to: