Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

China Hack Report: Daily US Tech Defense

China Hacks Rampage: React2Shell & BRICKSTORM Chaos, US Nukes Probed, VMware Backdoored, Sanctions Fly!

13 Dec 2025

Description

This is your China Hack Report: Daily US Tech Defense podcast.Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks hitting US tech defenses. Buckle up, because the last 24 hours as of December 13 have been a whirlwind of urgent patches and fresh alerts—let's dive straight into the chaos.Picture this: I'm sipping my late-night baijiu-laced coffee when CISA drops the hammer on React2Shell, that nasty CVE-2025-55182 with a perfect CVSS 10.0 score. Just yesterday, December 12, they revised the federal patch deadline to immediate action, no more lollygagging till December 26. Why? Chinese hackers—yeah, those state-sponsored crews with ties to the PRC—pounced on this React Server Components flaw hours after disclosure on December 5. Wiz reports opportunistic waves slamming Next.js apps in Kubernetes clouds, probing Taiwan, Uyghur regions, Vietnam, Japan, New Zealand hardest, but don't sleep on US hits: .gov sites, academic labs, even a uranium import authority got selective love. Palo Alto's Unit 42 confirms exploitation for remote code execution via unsafe deserialization. CISA's screaming: patch to React 19.0.1, 19.1.2, or 19.2.1 now, scan for indicators, segment networks, and report incidents stat.But wait, there's more heat from BRICKSTORM, the stealthy backdoor CISA and Canada's Cyber Centre unpacked on December 4. WARP PANDA, that slick China-nexus squad with cloud wizardry, deploys it on Windows and VMware vCenter/ESXi for eternal persistence in IT and government sectors. It masquerades in legit traffic, yoinks files, self-heals if disrupted—CrowdStrike's on it, linking to US entity breaches since April 2024. Madhu Gottumukkala, CISA's Acting Director, nailed it: these actors embed for sabotage. Immediate moves? Hunt IOCs, inventory edge devices, enforce Cross-Sector Cybersecurity Performance Goals, and isolate if found.Sectors under fire: critical infrastructure like energy and gov tech, with React2Shell eyeing nuclear ops. No brand-new malware in the last day, but BRICKSTORM's echoes linger, and UK's December 9 sanctions on i-Soon and Integrity Tech for reckless US/UK hits underscore the pattern—China's embassy called it "pot calling kettle black," but we're not buying.Defensive playbook from CISA: patch React2Shell yesterday, audit VMware for BRICKSTORM, enable EDR, segment like your data's life depends on it—because it does. Huntress warns of Gladinet hard-coded keys from December 11 bleeding into this, opening RCE doors on nine orgs already.Folks, stay vigilant—China's cyber game is OPSEC-tight and relentless. Thank you for tuning in, and hit subscribe for daily drops. This has been a Quiet Please production, for more check out quietplease.ai.For more http://www.quietplease.aiGet the best deals https://amzn.to/3ODvOtaThis content was created in partnership and with the help of Artificial Intelligence AI

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.