EPISODE · Feb 9, 2026 · 2 MIN
Ting Spills Tea: China's Cyber Squad Is Camping in US Power Grids and Nobody's Kicking Them Out Yet
from China Hack Report: Daily US Tech Defense · host Inception Point AI
This is your China Hack Report: Daily US Tech Defense podcast. Hey listeners, Ting here, your go-to cyber sleuth on all things China hacks shaking up US tech defenses. Picture this: it's been a wild 24 hours in the cyber trenches, and China's shadow warriors are flexing hard on American interests. Kicking off with the big one—Volt Typhoon, that sneaky China-linked APT crew unmasked back in 2023, is still burrowed deep in US critical infrastructure like communications, energy, transportation, and government networks. Fresh analysis from the International Institute for Strategic Studies dropped today, courtesy of John Bruce, their cyber power expert. He lays it out: these aren't just spies; they're pre-positioning for disruption if tensions boil over Taiwan. Why Guam? US naval ports and air bases there are prime targets for any Beijing blockade play. Networks with zilch intel value, but loaded with diagrams and OT manuals? That's sabotage prep, folks, thumbing noses at UN Norm 13(f) on not messing with critical public services. Not done yet—Microsoft's Defender team flagged multi-stage attacks exploiting exposed SolarWinds Web Help Desk servers for remote code execution, letting hackers pivot to high-value US assets. CISA just slapped CVE-2025-40551, a nasty 9.8 CVSS deserialization flaw, onto their Known Exploited Vulnerabilities catalog today—patch now or regret later. No new malware namedrops in the last day, but Volt Typhoon's persistence screams living-off-the-land tactics, no fancy zero-days needed, as FBI's Operation Winter Shield podcasters John Riggi echoed, stressing basic controls over exotic exploits. Sectors hammered? US infrastructure's the bullseye, with ripple warnings for allies—think Norway's digital grids under Salt Typhoon recon, per their security report. CISA's pushing immediate defenses: segment networks, enforce zero-trust, hunt for anomalies in edge devices. Microsoft's urging scans for SolarWinds footprints, while IISS calls out pre-crisis embedding. Pro tip from me: air-gap OT where you can, rotate creds like your life's on it—because it might be. Wrapping the chaos, leaked docs show China's secret platform rehearsing strikes on neighbors' infra, priming for US escalations. No service disruptions yet, but the intent's disruptive AF. Thanks for tuning in, listeners—subscribe for daily drops to stay ahead of the dragon. This has been a Quiet Please production, for more check out quietplease.ai. For more http://www.quietplease.ai Get the best deals https://amzn.to/3ODvOta
NOW PLAYING
Ting Spills Tea: China's Cyber Squad Is Camping in US Power Grids and Nobody's Kicking Them Out Yet
No transcript for this episode yet
Similar Episodes
Aug 28, 2025 ·25m
May 29, 2025 ·35m
Apr 22, 2025 ·32m
Feb 27, 2025 ·0m