Digital Dragon Watch: Weekly China Cyber Alert
China's Cyber Storm Surges! Hacks, Smishing & Espionage Explode as US-China Tech Tussle Boils
27 Oct 2025
This is your Digital Dragon Watch: Weekly China Cyber Alert podcast.Welcome back, listeners—Ting here with your weekly blast of caffeinated code and straight-up drama from the world of China cyber. Let’s skip the fanfare and jump headfirst into the bytes: it’s Digital Dragon Watch, and if you thought the last seven days would bring calm, guess again.First up, DDoS attacks across the Asia-Pacific region have absolutely mushroomed, with China standing in the center of the storm. StormWall experts reported a 116% surge compared to this time last year. Their data shows government agencies, telecom giants, and financial institutions are getting hammered, with one 2.3 terabit-per-second attack being the stuff of cyber legend. What’s scarier? Probing assaults—mini scans, the hacker’s pre-game warmup—went up by 3,500-fold, with China shouldering 22% of all attacks. Ramil Khantimirov called this the most challenging DDoS threat landscape ever, and the fact that botnet power is quadrupling means defenders are playing chess against AI grandmasters powered by crowds of zombie devices.But that’s not all, folks. Last Wednesday, the Cyberspace Administration of China dropped the mother of compliance updates: the National Cybersecurity Incident Reporting Management Measures. Coming into force next week, these new rules finally yank the patchwork of incident-reporting obligations into something resembling order. Every network operator in China—from social media kingpins to scrappy startup cloud hosts—now faces stricter, unified standards, with clear technical criteria and centralized channels for reporting. This harmonization is huge. If you’re doing business in China, the era of guesswork is over. Miss an incident and you’ll be sweating under CAC’s gaze.Meanwhile, espionage is getting stickier. APT group Earth Estries (yes, I see you) has expanded global reach using old-school persistence and new tactics to siphon government, research, and telecom secrets. Brandefense’s threat sheet spotlights their adaptability—even if their tools aren’t bleeding-edge, they compensate with relentless campaigns and strategic alignment to Beijing’s goals. Defensive moves? Patch anything facing the internet, lock down on phishing, and keep eyes out for sneaky DNS tricks or unauthorized VPN logins. Don’t get blindsided by scheduled task weirdness or web shells in the basement of your infrastructure.On the user-targeted front, ongoing smishing campaigns—think text-message phishing—have been burning since early last year, with threat actors leveraging nearly 200,000 domains in scams. They’re impersonating everything from delivery apps to government portals, trying to snatch credentials and financial data with scary efficiency.Zooming out for government response, reports from the Foundation for Defense of Democracies reveal progress but warn of big fragilities: the US still faces leadership gaps at CISA and the State Department's Bureau of Cyberspace and Digital Policy, which we absolutely need staffed up ASAP. Sean Cairncross, America’s cyber czar, says deterrence is working, but adversaries—especially China—aren’t feeling enough pain to stop. One remedy? More authority for the Office of the National Cyber Director and sustainable multi-year funding for CISA. Meanwhile, the Cyber Diplomacy Act and allied funding have helped keep Chinese firms from dominating core tech supply chains abroad—think HarmonyOS nudging out American operating systems in Shenzhen.And the cyber tit-for-tat is heating up. As of today, China’s Ministry of Foreign Affairs loudly accused the NSA of sophisticated cyberattacks against the national time system. This mutual finger-pointing, amplified by export controls and local bans, only deepens U.S.–China tech decoupling and sharpens the risk of retaliatory action from both sides.Experts say don’t wait for the breach—start continuous monitoring of the dark web, keep your backups up to date and offline, and drill your teams with realistic phishing simulations. Eliminate persistence by running full compromise assessments, and when in doubt, bring in cyber response pros before you start any backchannel ransom negotiations.That’s your digital intel drop for this week. Thanks for tuning in to Digital Dragon Watch—subscribe now, because next week will be even wilder. This has been a quiet please production, for more check out quiet please dot ai.For more http://www.quietplease.aiGet the best deals https://amzn.to/3ODvOtaThis content was created in partnership and with the help of Artificial Intelligence AI
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
3ª PARTE | 17 DIC 2025 | EL PARTIDAZO DE COPE
01 Jan 1970
El Partidazo de COPE
13:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
10:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
13:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana