Digital Dragon Watch: Weekly China Cyber Alert
China's Cyber Spies Lurking for Years! Brickstorm Backdoor Rocks Infosec World
05 Dec 2025
This is your Digital Dragon Watch: Weekly China Cyber Alert podcast.Hey listeners, this is Ting here with your Digital Dragon Watch weekly cyber alert. We've had quite the week in the cybersecurity landscape, and trust me, China's been busy. Let me walk you through exactly what's happening and what it means for you.The big story dominating cyber circles right now is called Brickstorm, a backdoor so sophisticated that CISA, the NSA, and the Canadian Centre for Cyber Security just dropped a major joint advisory about it on Thursday. Here's the thing that makes this terrifying: Chinese state-sponsored actors have been using this malware to tunnel into dozens of U.S. organizations, and they're not just passing through. According to Nick Andersen at CISA's Cybersecurity Division, these attackers are embedding themselves for the long haul. We're talking about an average dwell time of 393 days inside networks. That's over a year of undetected presence, which is absolutely wild.What makes Brickstorm especially gnarly is that it targets VMware vSphere environments and Windows systems, and it's written in Golang to be extra stealthy. Austin Larsen, a principal analyst at Google Threat Intelligence Group, tells us that CrowdStrike is tracking the actors behind this as Warp Panda, while others call them UNC5221. They're going after government agencies, IT companies, legal services firms, and even business process outsourcers to get downstream access to their clients. In one incident that CISA responded to, attackers stayed inside a network from April 2024 straight through September 2025.The attack vector here is sneaky. These folks are exploiting edge devices for initial access, then moving laterally through VMware vCenter servers using valid credentials they've stolen. Once inside, they're cloning virtual machine snapshots to extract credentials, creating hidden rogue VMs, and deploying other nasty tools like Junction and GuestConduit implants alongside the main Brickstorm backdoor. The team at CrowdStrike noted that the campaign shows deep knowledge of multi-cloud environments and identity systems.But that's not the only story. Just last Wednesday, AWS threat intelligence teams noticed something else disturbing: within hours of a critical React vulnerability being disclosed on December third, multiple China-linked groups including Earth Lamia and Jackpot Panda were already exploiting it. This vulnerability, tracked as CVE-2025-55182, has a maximum severity score of ten and affects React nineteen and Next.js fifteen and sixteen. These actors are using automated scanning tools with user agent randomization to evade detection, and they're simultaneously exploiting multiple vulnerabilities to maximize their hit rate.What should you do? If you're in critical infrastructure or government, the guidance is crystal clear. Scan your systems immediately using the YARA and Sigma rules CISA released. Inventory all your edge devices because that's where the attacks typically begin. Implement network segmentation so traffic can't freely move from your DMZ into internal systems. Disable RDP and SMB between network zones. Block unauthorized DNS-over-HTTPS providers that give attackers unmonitored communication paths. And for the love of good cyber hygiene, apply least-privilege access to service accounts and monitor them like a hawk.Madhu Gottumukkala, CISA's acting director, was clear about the stakes: These aren't just infiltrations—they're infrastructure wars in slow motion. The attackers are positioning themselves for future operations, studying dependencies, and mapping out exactly what they could disrupt if needed. This is espionage with strategic depth, and it's happening right now.Thanks so much for tuning in to this week's Digital Dragon Watch. Make sure you subscribe so you don't miss the next major threat landscape shift. This has been a quiet please production, for more check out quiet please dot ai.For more http://www.quietplease.aiGet the best deals https://amzn.to/3ODvOtaThis content was created in partnership and with the help of Artificial Intelligence AI
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
3ª PARTE | 17 DIC 2025 | EL PARTIDAZO DE COPE
01 Jan 1970
El Partidazo de COPE
13:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
10:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
13:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana