Ting Spills the Tea: Chinas Cyber Army Goes Full Throttle on Taiwan While Stealing Your Zoom Passwords

Ting Spills the Tea: Chinas Cyber Army Goes Full Throttle on Taiwan While Stealing Your Zoom Passwords

3:29 Jan 6, 2026
About this episode
This is your Cyber Sentinel: Beijing Watch podcast.Hey listeners, Ting here with your Cyber Sentinel Beijing Watch update, and let me tell you, the cyber front has been absolutely bonkers this week.So picture this: China's cyberarmy just hit Taiwan with 2.63 million intrusion attempts per day in 2025, which is more than double the 1.23 million daily attacks from 2023. That's not just an uptick, that's a full-throttle assault on Taiwan's critical infrastructure. According to Taiwan's National Security Bureau, attacks on critical energy infrastructure specifically jumped tenfold compared to 2024. They're basically trying to choke out the island's power grid one exploit at a time.But here's where it gets interesting for us. While Beijing's hammering Taiwan's defenses, they're simultaneously developing new methodologies that have direct implications for American infrastructure. The Institute for the Study of War released analysis showing that China's recent Justice Mission 2025 military exercises weren't just posturing, they were testing actual blockade strategies that could cripple Taiwan's port cities like Kaohsiung, Keelung, and Hualien. The tactical playbook here matters because it reveals how Beijing thinks about cutting off critical supply lines, and that translates to potential vulnerabilities in our own systems.Now, on the attribution front, things are getting murky in ways that should concern us. According to Ankura's latest cyber intelligence update, the China-linked threat actor DarkSpectre has been absolutely crushing it with their Zoom Stealer campaign, affecting 2.2 million users across Chrome, Firefox, and Edge through eighteen compromised extensions. They've targeted over 7.8 million users over seven years. These folks are collecting meeting data, URLs, IDs, and embedded passwords, which screams corporate espionage potential. DarkSpectre's infrastructure sits in Chinese territory with ICP registrations and code artifacts featuring Chinese language elements, so the attribution is pretty solid.The strategic implications are wild. According to reports from the Institute for the Study of War and various US think tanks, Beijing's probably viewing this current period as a strategic window. They're not just testing military doctrine, they're simultaneously probing our cyber defenses while we're distracted. Meanwhile, we've got over ten thousand Fortinet FortiGate firewalls still exposed to a critical two-factor authentication bypass vulnerability from 2020, with thirteen hundred vulnerable devices just in the United States alone.Here's what keeps me up at night: while Beijing's conducting military drills and cyberattacks on Taiwan, they're also conducting reconnaissance against us. These aren't separate operations, they're synchronized pressure campaigns designed to test our deterrence posture. The recommended security posture here is straightforward but urgent: patch yo
Select an episode
0:00 0:00