Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Digital Dragon Watch: Weekly China Cyber Alert

Digital Dragons Hack SentinelOne: Chinese Espionage Gone Wild!

19 Jun 2025

Description

This is your Digital Dragon Watch: Weekly China Cyber Alert podcast.Welcome to Digital Dragon Watch: Weekly China Cyber Alert, I’m Ting—your favorite witty, slightly caffeinated, definitely cyber-obsessed companion. No time to waste, because China-linked adversaries certainly haven’t!Let’s cut straight to the breach: the single most significant incident this week comes from SentinelOne’s showdown with none other than China-nexus threat actors. These adversaries went for SentinelOne’s jugular, surveilling their servers and, more worryingly, hacking into an IT hardware supplier. The aim? Infect employee laptops before they even left the factory—hello, supply chain compromise! Fortunately, SentinelOne spotted the threat, slammed the cyber-door, and lived to tell the tale. But here’s the kicker: over 70 organizations got swept up in this campaign across sectors like manufacturing, finance, government, telecom, and research. SentinelOne researchers Aleksandar Milenkoski and Tom Hegel identified the perpetrators as a cluster called PurpleHaze, closely tied to APT15 and UNC5174. If those names don’t ring a bell, think China’s best in cyber espionage cosplay.The infiltration didn’t stop at SentinelOne. Victims included a South Asian government agency and a major European media house. The dwell time—the digital equivalent of how long burglars stayed in your house—varied from lightning-fast to several months. Scarier still, some intrusions were only remediated quickly thanks to SentinelOne’s sharp eyes. The attackers were thorough: mapping internet-facing servers and prepping for possible future attacks. Defenders, take notes—“just enough exposure for functionality” is a dangerous game.Meanwhile, the U.S. isn’t napping. In Congress, Senator Maria Cantwell has demanded answers from telecom titans AT&T and Verizon about the Salt Typhoon breach linked to Chinese state actors. These attacks were sophisticated enough to prod both companies into transparency, a minor miracle in telecom. And let’s not forget the UK. Their National Cyber Security Centre just publicly called out China as the dominant threat to national cybersecurity, after a string of hacks that had them pushing DEFCON levels.On the innovation front, attack vectors are getting creative. Just a few weeks ago, Chinese APT41 was caught using Google Calendar in its espionage toolkit. Why brute-force a firewall when you can slip a payload through your invite to “Weekly Sync”?What’s an expert to recommend? First, don’t trust your supply chain blindly—vet all third-party hardware. Network segmentation, tight access controls, and constant monitoring of both user and admin activity are a must. Run red team exercises to simulate these new attack vectors. For defenders out there, keep incident playbooks fresh—these threat clusters evolve faster than a TikTok trend.So, whether you’re a sysadmin watching patch cycles or a CEO wondering why the SOC budget is so high, the lesson is clear: China’s digital dragons are wide awake, but with vigilance, we can keep their fire at bay. This has been Ting, bringing you the byte-sized truth in a megabyte world. Catch you next week—unless I’m patching another zero day!For more http://www.quietplease.aiGet the best deals https://amzn.to/3ODvOtaThis content was created in partnership and with the help of Artificial Intelligence AI

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.