Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

China Hack Report: Daily US Tech Defense

Microsoft's Patch Panic: China's Cyber Tag-Team Strikes Again!

27 Oct 2025

Description

This is your China Hack Report: Daily US Tech Defense podcast.Hello listeners, Ting here, your go-to for China Hack Report: Daily US Tech Defense—diving headfirst into the past 24 hours where digits met drama and national security had another sleepless night.Let’s cut straight to what set keyboards clacking: Microsoft’s emergency patch. If you work with Windows Server Update Services, listen up! Microsoft just confirmed active exploitation of a devastating remote code execution flaw—CVSS 9.8, brutal even by hacker standards. This is CVE-2025-59287, and it lets attackers turn legitimate Windows updates into sneaky malware delivery—think “trusted system update” morphing into stealthy sabotage. Microsoft pushed a fix on October 23, 2025, and the Cybersecurity and Infrastructure Security Agency (CISA) shouted an all-out alert for every U.S. agency and company running WSUS: patch now, reboot, and validate every system. CISA was explicit—servers without the new patch could let attackers poison entire enterprise networks. If you haven’t patched yet, stop multitasking and do it. Seriously.But the drama doesn’t end there. Over the last day, Trend Research dropped a bombshell about new “Premier Pass-as-a-Service” tactics among China-aligned advanced persistent threat groups, chiefly Earth Estries and Earth Naga—also known in the cool kids’ club as Flax Typhoon or RedJuliett. These groups are not just hacking separately anymore. Instead, they’re sharing compromised network access—like one group breaking in, then handing over the virtual keys to another, who moves in for the data loot. It’s next-level coordination, and it’s been seen across government and telecom sectors, even hitting major retail organizations. Earth Estries deployed its CrowDoor backdoor for stealth, then Earth Naga swept in with the notorious ShadowPad malware. Both toolkits have been part of real, confirmed attacks from late 2024 through mid-2025, but the ramifications for U.S. critical infrastructure and supply chains are only piling up.Now, phishing is an old game, but the massive “Smishing Triad” campaign reported by Palo Alto Networks’ Unit 42 takes it global. Attackers ran over 194,000 malicious domains, many with traces back to Chinese infrastructure, distributing SMS phishing messages imitating everything from government agencies to parcel carriers. The domains reset and respawn so rapidly, security teams struggle to blacklist them before your HR gets that fateful “urgent tax notice” text.Ransomware didn’t take the weekend off: On October 26, the Play ransomware crew hit Metal Pros, a big U.S. manufacturing player, and threatened a leak unless paid. The list of recommendations from response pros is a must-do—incident reviews, encrypted backups, threat intel integration, and your best friend: multi-factor authentication.Big picture: national strategy and CISA's work are being stretched to the limit, as covered in the latest FDD cyber report. Ongoing call-outs urge Congress to stabilize cybersecurity funding and staff, noting without it, adversaries won’t feel the pain, while U.S. companies bear the brunt. Tech diplomacy, too, is now squarely on the table—clear as day that Chinese state-linked hackers are raising their game globally.Thanks for tuning in—remember to subscribe so no cyber shadow can catch you napping. This has been a quiet please production, for more check out quiet please dot ai.For more http://www.quietplease.aiGet the best deals https://amzn.to/3ODvOtaThis content was created in partnership and with the help of Artificial Intelligence AI

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.