About this episode
This is your Cyber Sentinel: Beijing Watch podcast.Hey listeners, Ting here on Cyber Sentinel: Beijing Watch, diving straight into the hottest Chinese cyber chaos from the past week leading up to February 20, 2026. Buckle up—China's hackers are flexing like never before, and Uncle Sam’s security is feeling the burn.Volt Typhoon, that stealthy Chinese nation-state crew operational since 2021, is still burrowed deep in US critical infrastructure like utilities, telecoms, and defense networks. Dragos researchers confirm they're exploiting zero-days in edge devices like VPNs and gateways, using bespoke malware such as Brickstorm and the new Grimbolt backdoor to hide C2 traffic in legit web sessions. CYFIRMA's Weekly Intelligence Report nails it: these guys target virtualization tech for long-term espionage, prepping for potential sabotage. Google's Mandiant ties UNC6201—a Volt Typhoon alias—to the actively exploited Dell RecoverPoint CVE-2026-22769, with hardcoded creds letting them spin up ghost NICs for sneaky lateral moves. CISA's screaming at feds to patch in three days, since exploitation kicked off mid-2024.Targeted industries? Defense industrial base tops the list—think stealing military IP to kneecap US production. Palo Alto's Unit 42 Global Incident Response Report 2026 says Chinese ops hit OT environments in energy, manufacturing, and transport via groups like Sylvanite, blending living-off-the-land with social engineering. Over in the Philippines, AFP reports persistent China-linked attacks on military nets amid South China Sea beefs. Even Singapore's telcos just repelled a marathon campaign from Beijing-sponsored hackers.Attribution evidence is ironclad: Mandiant links these to Silk Typhoon hallmarks—zero-day chains, custom implants. CYFIRMA spots Volt Typhoon's MITRE TTPs like obfuscated files, token manipulation, and registry queries for persistence.Internationally, US National Cyber Director Sean Cairncross at the Munich Cyber Security Conference pushed for allied-private sector team-ups, echoing Marco Rubio's "America First but not alone" vibe against China et al. Italy's reeling too—a Chinese hack dumped PII on 5,000 DIGOS counterterrorism cops, per Decode39, exposing anti-dissident ops.Tactically, lock down identities—Unit 42 says they drove 90% of 750+ breaches. Patch Dell and BeyondTrust flaws yesterday; segment OT nets; hunt ghost NICs and Brickstorm beacons. Strategically, this is pre-conflict positioning—disrupt US logistics in a Taiwan flare-up. Beef up supply chain vetting, AI-driven anomaly detection, and info-sharing pacts.Listeners, stay vigilant—China's not playing; they're probing for D-Day. Thanks for tuning in to Cyber Sentinel: Beijing Watch—subscribe now for the unfiltered intel! This has been a Quiet Please production, for more check out quietplease.ai.For more http://www