Beijing's Hacker Army Hits Taiwan 960 Million Times While US Power Grid Data Hits the Dark Web for Bitcoin

Beijing's Hacker Army Hits Taiwan 960 Million Times While US Power Grid Data Hits the Dark Web for Bitcoin

3:40 Jan 7, 2026
About this episode
This is your Cyber Sentinel: Beijing Watch podcast.Hey listeners, Ting here with Cyber Sentinel: Beijing Watch, diving straight into the hottest Chinese cyber chaos from the past week as of January 7th. Picture this: I'm hunkered down in my digital war room, caffeine-fueled, tracking Beijing's hackers like a cat on a laser pointer. Taiwan's National Security Bureau dropped a bombshell on January 4th—their annual report shows China's cyber army slammed Taiwan's critical infrastructure with 960 million intrusion attempts in 2025, averaging 2.63 million daily hits, up 6% from last year. Energy sector? A insane tenfold surge, probing industrial control systems in power grids and gas lines with malware implants. Hospitals got ransomware hammered, data dumped on dark web forums—at least 20 cases. Groups like Flax Typhoon, APT41, BlackTech, Mustang Panda, and UNC3886 specialized: energy for Flax, healthcare for APT41, comms for BlackTech. They mix vuln exploits—over half the ops—DDoS smokescreens, phishing, and supply chain stabs, timed to PLA patrols, President Lai Ching-te's events, and Taiwan's big ceremonies. Foundation for Defense of Democracies calls it cyber-enabled economic warfare prep for blockades, stealing semi tech from TSMC suppliers too.Stateside, it's spilling over. Early January, threat actors hawked 139 GB of Pickett USA engineering data—LiDAR scans, orthophotos, MicroStation files for Tampa Electric, Duke Energy Florida, American Electric Power—on dark web for 6.5 Bitcoin. That's active transmission lines, substations, veg data ripe for sabotage. Echoes last year's Treasury breach via BeyondTrust key, and Mandiant's UNC3886 Juniper router exploits. Fears mount over Chinese-made inverters in US power firms, per recent reports—backdoors waiting to flip the switch. Microsoft's tying Linen Typhoon, Violet Typhoon to SharePoint flaws and F5's BRICKSTORM backdoor.Tactically, these squads coordinate like a Beijing symphony: pre-position for blackouts, morale-crushers during drills. Strategically? Hybrid war gold—cripple Taiwan without firing shots, test US resolve amid Venezuela cyber strikes where we zapped Chinese radars. Attribution's ironclad via NSB, Mandiant IOCs.Internationally, US pushes Taiwan resilience: tech advisors, energy stockpiles, convoy drills with Oz. Responses? Quiet deterrence, but Trump's team flexed cyber muscle.Listeners, lock it down: Patch vulns yesterday—Juniper, SharePoint. Vet supply chains like Pickett's "extended enterprise" fail. Segment ICS, drill CEEW recovery, build offensive cyber for Taiwan. Ditch Chinese inverters, hunt UNC3886 beacons. Witty tip: If Beijing's your mama, time to change the locks.Thanks for tuning in—subscribe for more edge! This has been a Quiet Please production, for more check out quietplease.ai.For more http://www.quietplease.aiGe
Select an episode
0:00 0:00