CyberWire Daily - Confronting China’s Expanding Cyber Threats [Threat Vector]

Episode Date: January 1, 2026

While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks. In this episode of Threat Vector, host David Moulton talks with Wendi Whi...tmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments.  Wendi shares critical insights on how nation-state threats have evolved, why AI must be part of modern defense strategies, and the importance of real-time intelligence sharing. They also dive into scenario planning as a key to resilience. If you want to know how cybersecurity leaders are preparing for the next wave of threats, this episode is a must-listen. From the show: ASEAN Entities in the Spotlight: Chinese APT Group Targeting Preparing for a Secure Paris 2024 Unit 42 Predicts the Year of Disruption and Other Top Threats in 2025 FBI talks about how China is testing AI in cyberattacks Hear more from Wendi Whitmore on Threat Vector: Episode 5: From Nation States to Cybercriminals Join the conversation on our social media channels: Website:⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠ Threat Research:⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠ Facebook:⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠ LinkedIn:⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠ YouTube:⁠ ⁠⁠@paloaltonetworks⁠ Twitter:⁠ ⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠ ⁠http://paloaltonetworks.com⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. I think for threat intelligence sharing to be effective, though, is it needs to be contextualized and actionable, and it can't be slow and gated and working through bureaucratic means in order to get the information shared. So the reality there is there is still a lot of person-to-person and organization-to-organization sharing that's going on. But I think that's actually happening in a much more effective level than previously. The Russia-Ukraine invasion really was a catalyst for a lot of that. And that's not to say that there wasn't great information sharing going on before because there was. But when it actually came time to say, wow, okay, we need, there are people's lives we need to protect here.
Starting point is 00:00:53 I think a lot of those barriers broke down. Welcome to Threat Vector, the Palo Alto Networks podcast, where we discuss pressing cybersecurity threats and resilience and uncover insights into the latest industry trends. I'm your host, David Moulton, Senior Director of Thought Leadership for Unit 42. Today I'm speaking with Wendy Whitmore, Chief Security Intelligence Officer at Palo Alto Networks. Wendy brings more than two decades of experience leading incident response and threat intelligence teams at organizations like Mandia, CrowdStrike, IBMX Force, and Unit 42 for Palo Alto Networks. She's an inaugural member of the DHS Cyber Safety Review Board and serves on the Cybersecurity Advisory Board at Duke University and the University of San Diego. Wendy is a highly respected voice in national and global cybersecurity strategy with extensive experience countering nation-state and AI-driven threats. Today, we're going to talk about the evolving scale and sophistication of Chinese nation-state
Starting point is 00:01:59 cyber threats, the targeting of critical infrastructure, and how defenders can better prepare in a rapidly accelerating AI environment. This topic is critically important because we're witnessing nation-state actors, particularly from China, operating with unprecedented speed, persistence, and global reach. Threatening not just corporate intellectual property, but critical infrastructure that underpins everyday life. As defenders, we need new strategies, faster detection, and greater resilience
Starting point is 00:02:31 across entire ecosystems. Here's our conversation. Wendy, welcome back to Threat Factor. Good to see you again. Thanks, David. Happy to be here. Great to see you. I know that you've been busy lately.
Starting point is 00:02:48 Congrats on the new role. Thank you. And you've been on panels, even today. And I wanted to get into some of the conversations that you've been having, talking about some of the Chinese threat actors and some of the tactics and behaviors that you're seeing. Yeah, well, I think, first of all, it's a busy week, right? A lot of hot topics going on here at RSA. And China as a nation state threat actor is certainly one of those that I think is at the top of everyone's list. So we had the opportunity to cover various typhoon actors, what we're seeing,
Starting point is 00:03:26 and then really the broader spectrum of Chinese nation state cyber threat activity. So I think it's fair to say, so I have been conducting investigations in this space, specifically towards nation state actors for almost 25 years. It's been a minute. It's a while. And we have never seen before during that time frame the scale of persistent threat. activity that we're seeing today from Chinese nation state threat actors. So hands down, you know, barn on, that is the reality today. And I think that what makes it a little different
Starting point is 00:04:03 than what we've seen before is their ability to operate and collect information and data at scale, whether it's from critical infrastructure entities, whether it's for corporate espionage purposes, whether it's simply data collections to be used for a later time. And so that's concerning and that's certainly at the top of everyone's mind. Some examples of that are like we see CVEs being exploited at scale to a degree that we have not seen before. We're looking at within hours and some cases minutes in mass vulnerabilities being identified and then systems being systems and applications and services being identified for future exploitation. So that's a concern whether you're a critical infrastructure operator or you're running a technology
Starting point is 00:04:50 organization, that those continue to be extremely pervasive. I think another example of the scale we're seeing, when you look at government espionage, within the United States, we talk a lot about threats to the United States. But the reality is, if you're an ally of the Chinese government, you're just as likely to be impacted by espionage as people who are not on the top of that ally list. So last year, we released research about 23 different government. organizations in Cambodia being compromised at nearly the same time. So we're looking at whole of government scale operations.
Starting point is 00:05:29 And then specifically related to China and Taiwan, right? We're seeing any business entities, government organizations that are operating within the South China Sea, Europe in particular, has 40% of its trade moving through the South China Sea. So at any time, that's a concern in terms of just the discussions that are at the forefront of everyone's mind related to trade negotiations and international trade policy and how are countries going to be reacting to that. All of it's super intertwined. So that's definitely at the top of the list in terms of concerns. Wendy, that sounds incredibly concerning. What are some of the
Starting point is 00:06:08 implications of the outdated OT systems, those with remote access? How are those systems playing into some of the cases that you're looking into? Well, I think the biggest concern there is that in many cases, industrial control systems and OT environments were not designed with security in mind. They were designed with uptime and availability as their primary goal. And so that means security is oftentimes bolted on after the fact. So now you have legacy systems, which in many cases are end of life. They're not able to be patched, and they're critical to making sure manufacturing environments
Starting point is 00:06:44 are running correctly, as well as other types of. of environments that are leveraging that technology. So we see this not only in ICS environments, but we see it even in corporate IT environments where attackers are specifically going to devices at the edge that don't have the same types of endpoint protection in place in order to compromise those and leverage them as a way into the environment. So that continues to be really a major concern in an area that will likely continue to be for some time moving forward. You know, we talked about this on the panel I was on, about the idea of rethinking air-gapping and whether that's really an effective security strategy, because unfortunately, we all know
Starting point is 00:07:26 that people are at the heart of getting security done, and what you have is administrators who have already a tough job to do. They're pulled in a million different directions, and so what happens? They tend to reuse passwords both within the corporate IT environment as well as within the industrial control systems environments, and those oftentimes are a big target. from these attackers. I think though that one of the bigger issues is just a need for a cultural mindset shift.
Starting point is 00:07:54 So we're working with an organization that we're responding to a breach hat and it has a number of OT environments as well as their corporate IT environment. And in the wake of the breach, those executives and the security teams realize, well, okay, we really need to rethink the entire way that we approach security.
Starting point is 00:08:13 The way we've been doing it isn't going to be effective moving forward in terms of being able to have insight and visibility at the edge within the OT environment. They realize the criticality of it. But unfortunately for them, they realize that after the fact and after a breach, we want more organizations to be thinking of this proactively and be looking at how they can implement really zero trust principles within those OT environments. Yeah, you're reminded me of sitting across from my doctor a couple years ago. And he was telling me, Yeah, it's time for some blood pressure medicine. And, you know, it was after the fact that I got the message.
Starting point is 00:08:48 And it would have been better had I started running, maybe cut down on the salt and the caffeine. I don't know when some of these lessons learned are going to show up for organizations that are moving fast and realizing that maybe uptime and security can be equal partners and what they're looking to achieve in the way that they're measuring things. or we're going to have this massive scale of attacks that you're talking about with the vaults and maybe others. Well, I think there is, like, if there's a shred of good news, I think the reality is that AI is actually going to make changes in that because what you're talking about is just this bigger picture, like software is oftentimes built and hardware systems are built,
Starting point is 00:09:31 and then security is tested for after the code is developed. And so now what you're seeing is AI has the ability to inject into that software, life cycle and that entire process to where we can identify potential vulnerabilities in the code much earlier than we used to. We can identify where there's hard-coded passwords, where there's potential CVEs that can be exploited, and that's all part of this continuous development life cycle that's fixed prior to being shipped. So that is going to make some impact. Well, and that's really exciting because the cost of fixing it before it's deployed, and as you said, you can't update it its end of life. That changes the game significantly.
Starting point is 00:10:10 Maybe there's some other wins that we can talk about, and I'd want to focus on defenders where they're finding some success. Can you talk about what's working well maybe with threat detection and intel sharing? I do think intel sharing is happening more effectively than ever before, and I'll provide two cases for that, two use cases. So one, in the panel I was on yesterday, we talked specifically about the intelligence sharing that goes on between the threat detection teams at Microsoft and our intelligence teams within Unit 42
Starting point is 00:10:43 and larger Palo Alto networks. That's an ongoing dialogue. People are in Slack channels together. They're on the phone together on a daily basis, sharing information in real time. So I think for threat intelligence sharing to be effective, though, is it needs to be contextualized and actionable, and it can't be slow and gated
Starting point is 00:11:05 and working through bureaucratic, means in order to get the information shared. So the reality there is there is still a lot of person to person and organization to organization sharing that's going on. But I think that's actually happening at a much more effective level than previously. What's allowing it to be getting better? Like what are the cultural things? What are the shifts, the policy changes? Yeah, I think culturally, my perspective is that the Russia-Ukraine invasion really was a catalyst for a lot of that. And that's not to say that there wasn't great information sharing going on before because there was. But when it actually came time to say, wow, okay, we need, there are people's lives we need to protect here.
Starting point is 00:11:46 I think a lot of those barriers broke down between competitors in particular. So when you look at the intelligence dialogue that's going on between all of these organizations that traditionally compete to sell products to sell services, I think that barrier is really decreased. So, Wendy, what's next? How can organizations better prepare through scenario planning? I think scenario planning and live action kind of testing and exercises is one of by far the best opportunities organizations. have to prepare. But in order to do that successfully, there are some key pieces. One, it cannot be just security professionals who are involved in that. It really needs to be from the boardroom to the security operations center, and then better yet, extending to partners,
Starting point is 00:12:53 vendors, external counsel, law enforcement, and even better yet, bring the regulators into this dialogue. All of those organizations, if working together, are really, there to help protect organizations against these threats to make sure that they are resilient when there is a breach. And so the most prepared organizations we see are having that level of dialogue and preparedness and making sure that those relationships are in place in advance of an attack and that they're not only looking at like what happens if our organization goes down, but they're looking at what if one of my most critical supply chain providers goes down? What do we do then? How do we communicate with them during this event?
Starting point is 00:13:35 event, what kind of new infrastructure are we going to be setting up, and that's everything from the hardware that may be required to run the network, to how are we going to, like, what email devices, for example, what email accounts are we going to communicate from, right? All of those are things that should be included in that pre-planning. Another example, though, kind of related to your last question with private and public partnerships, An example of a tabletop exercise that we at Unit 42 recently participated in included Microsoft. It included many other organizations within JCDC, and it was actually related to an AI attack. And so those are the type of really comprehensive planning scenarios that we all want to be involved in,
Starting point is 00:14:25 and we encourage our clients to participate in. Because if one of your cloud providers, for example, goes down, that becomes now a critical infrastructure provider. We all need to be prepared to figure out how we're going to work through those scenarios. Wendy, when you're talking about that, I'm going back to a comment you made. In 25 years of watching APTs out of China, you've never seen the scale, the speed, you've never seen that type of volume of attack. Is it a new type of training that's required because of AI, because of the strategic, level that these attacks are these attacks that you're seeing. That's the new normal. That's the new
Starting point is 00:15:09 baseline of what organizations should be thinking about and doing. Absolutely. I agree with that. I think that you're looking at a level of breadth across an organization and their entire ecosystem of providers and experts that they work with on a daily basis to come together to really ensure that the entire ecosystem is resilient. We, I think, agree. example of this is the work we did with the Olympics last year. So the Paris Olympics and summer, we worked with critical infrastructure providers who are providing power to the games. Transportation, rail lines, airways, buses, infrastructure providers like the actual physical security at these events, and then all of the financial processing systems. So not necessarily the Olympic committee
Starting point is 00:16:01 itself, which might be forefront and top of everyone's mind. But I think that shows just all of the providers that have to come together to make some sort of big event possible. What we did was in advance of the Olympics, we went through all kinds of scenario planning that involved everything from a, you know, train going down to the inability to process ticketing systems into a venue where there might be 50,000 people coming in. All of that to figure out, okay, how are we going to adapt quickly. How are we going to stand up new network infrastructure at a moment's notice to make sure that these events run securely? And that's the type of planning that we need organizations to be doing about running their business and having the level of resiliency needed
Starting point is 00:16:44 for a cyber attack. Yeah, we often talk about the weakest link is the problem. And when you're talking about integrated systems and businesses, any of those could have a weakest link inside of them, and it takes down the entire thing. I think about the idea of the Olympics and losing transportation or payment, and that's the game, right? You're immediately in trouble. So let's look into the future a little bit and predict. What are some of the blind spots that concern you? I think right now, the speed with which AI is being implemented and the level vulnerabilities that that presents to organizations as they need to build AI within their applications, they need to adapt and adopt technologies that are leveraging AI. It's just creating
Starting point is 00:17:35 a lot of potential for new areas of weakness that we haven't yet identified. Just this week, the FBI released information that suggests that the Chinese government is testing AI as part of the entire attack life cycle. And that's something we suspect not only nation states are going to be doing, but certainly cybercriminals as well. What's the top-step organizations should take right now? So we often say, David, that organizations should be fighting AI with AI. But that term can be misinterpreted or it can be kind of ambiguous. And so what do I mean by that?
Starting point is 00:18:15 I mean organizations need to be looking at on the defensive side how they implement AI into their workflows to give them increased visibility and increased speed to detect threats. There is no way that we are going to defeat these adversaries if we are working at manual speed and not taking as many of the manual tasks away from the humans, letting machines do those and letting humans do what we do best, which is really then work on solving the most challenging problems that exist within the space with the aid of technology that's solving some of the larger, more processes that we can automate. What is the one thing a listener should take away from today's conversation?
Starting point is 00:18:59 Cybersecurity has never been more important than it is today. So the more that organizations can take that threat seriously, know that other nation-state adversaries throughout the world are leveraging cybersecurity to attack us, to attack our allies, and the investments need to be made in making sure that their organization is in a consistent shield-up posture at all times. Wendy, thanks for a great conversation today. I really appreciate you spending the time,
Starting point is 00:19:34 sharing the insights, talking about public-private, talking about some of the things that you're seeing that are going on with nation-state cyber threats. We'll look forward to having you back on Threat Factor as soon as you're ready. Awesome. Thank you, David. that's it for today if you've liked what you heard please subscribe wherever you listen and leave us your review on apple podcast or Spotify those reviews really do help me understand what you want to hear about if you want to reach out to me directly about
Starting point is 00:20:01 the show email me at threat vector at palo Alto networks.com I want to thank our executive producer Michael Heller our content and production teams which include Kenny Miller Joe Benicourt and Virginia Tran Elliot Peltzman edits the show and mixes the audio we'll be back next week until then stay secure, stay vigilant. Goodbye for now.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.