Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Digital Frontline: Daily China Cyber Intel

Digital Frontline: Evasive Panda's DNS Poison Party - China's Cyber Spies Crash Turkeys Domains

26 Dec 2025

Description

This is your Digital Frontline: Daily China Cyber Intel podcast.Hey listeners, Ting here on Digital Frontline, your go-to for China's cyber chess moves against US turf. Diving straight in—no fluff, just the fresh intel from the last 24 hours as of December 26th. Kaspersky just dropped a bombshell: China-linked Evasive Panda, aka Bronze Highland or Daggerfly, ran a slick DNS poisoning op to sling their MgBot backdoor at targets in Türkiye, China, and India. We're talking adversary-in-the-middle tricks, faking updates for SohuVA video streams and Baidu's iQIYI from poisoned domains like p2p.hd.sohu.com.cn and dictionary.com. They XOR-encrypt payloads in PNGs, stash 'em with custom DPAPI-RC5 crypto, and boom—persistent espionage. This crew's been at it since 2012, but the report flags their geo-targeted ISP hacks or router implants as the sneaky entry. US interests? Watch your DNS resolvers; these pandas are evading like pros.Targeted sectors? Telecom and ISPs are ground zero for DNS fiddling, but it spills into government and critical infra—echoing Cisco's December 10 alert on UAT-9686 exploiting a zero-day in AsyncOS for Secure Email Gateways. No fresh US hits confirmed today, but Western Illinois University's cyber feed ties Evasive Panda directly to today's news, warning of MgBot's spread. Broader vibe from CYFIRMA's weekly: China-aligned BlindEagle hitting Colombian gov via fileless chains and Discord C2, modernizing for stealth—modular loaders, steganography. Not US-direct, but their playbook screams prep for our grids and clouds.Defensive advisories? FCC banned foreign drones December 23—China-made UAS and parts now on the Covered List over spy risks. Patch AsyncOS yesterday if you're Cisco'd up. Experts like Kaspersky's Fatih Şensoy say audit DNS traffic for AitM, block non-standard resolutions from legit sites. CYFIRMA flags Qilin ransomware eyeing Asia-Pacific Windows ops with masquerading tasks and sandbox evasion—US firms, segment your networks.Practical recs for you biz warriors: Enable DNSSEC everywhere, deploy EDR with behavioral DNS monitoring—CrowdStrike or SentinelOne style. Rotate certs, hunt for perf.dat loaders in perfmon dirs. Train teams on fake Sohu or Baidu update lures; MFA alone won't cut it against device code phishing cousins. Segment OT from IT, especially energy—Russia's GRU is misconfig-hunting edges, but China's copying homework.Witty aside: These hackers treat DNS like a bad blind date—poison it once, ghost forever. Stay vigilant, listeners—assume your resolver's compromised.Thanks for tuning in—subscribe for daily drops! This has been a Quiet Please production, for more check out quietplease.ai.For more http://www.quietplease.aiGet the best deals https://amzn.to/3ODvOtaThis content was created in partnership and with the help of Artificial Intelligence AI

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.