In an era of escalating geopolitical tensions, the surge in Chinese-linked cyber espionage activities targeting U.S. industries underscores the critical need for robust defenses. Recent breaches highlight how state-sponsored actors are exploiting vulnerabilities to steal intellectual property, compromise national security, and disrupt operations. At Harborcoat, we are dedicated to equipping security and IT leaders with the insights and strategies to navigate these threats effectively. This edition breaks down the latest incidents, their impacts, and actionable recommendations to strengthen your organization’s resilience.

The Incidents: Recent Chinese-Linked Cyber Espionage Campaigns

September 2025 has seen a marked increase in sophisticated cyber operations attributed to Chinese state-sponsored groups, focusing on U.S. defense, technology, and legal sectors. These attacks leverage advanced tools and exploit known vulnerabilities in edge devices and software supply chains.

Key campaigns include:

  • RedNovember (aka TAG-100 or Storm-2077): This cluster, tracked by Recorded Future and Microsoft, has targeted global governments and private entities, including at least two U.S. defense contractors, aerospace firms, and law firms. Between July 2024 and July 2025, the group exploited flaws in devices from vendors like Cisco, F5, Fortinet, Ivanti, Palo Alto Networks, SonicWall, and Sophos. They deployed malware such as the Go-based backdoor Pantegana, Cobalt Strike, and Spark RAT for reconnaissance, persistence, and data exfiltration. Notable activities include targeting Outlook Web Access (OWA) portals in South America and maintaining long-term access to Southeast Asian intergovernmental organizations.
  • UNC5221 and Brickstorm Malware: Mandiant and Google Threat Intelligence Group (GTIG) reported a “next-level” campaign using the stealthy Brickstorm backdoor, which evades detection with long dwell times (up to 400 days). This group, linked to Chinese actors, infiltrated U.S. software developers, cloud-computing firms, and law firms like Wiley Rein, stealing proprietary source code to identify zero-day vulnerabilities. The attacks focus on systems without endpoint detection and response (EDR), such as email gateways and VMware environments, enabling downstream compromises of customers.
  • Broader CISA Advisory on PRC Actors: The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with international partners, issued an alert on Chinese APT actors compromising networks worldwide since 2021. These groups target telecommunications, government, transportation, and military infrastructure, using exploited CVEs (e.g., CVE-2024-3400 in Palo Alto Networks) and custom tools like Golang-based SFTP clients for data theft. U.S. entities are among those affected, with stolen data feeding China’s global espionage apparatus.

These incidents reflect a coordinated effort, with overlaps in tools and tactics among groups like UNC5221, RedNovember, and others, amid heightened U.S.-China trade disputes.

Immediate Impacts: Compromised Data and National Security Risks

The breaches have led to significant disruptions and losses:

  • Data Exfiltration and IP Theft: Hackers have stolen sensitive information, including emails from law firm attorneys involved in trade and national security matters, proprietary software code, and intelligence on defense contractors. This enables future attacks and undermines U.S. competitive advantages in technology and aerospace.
  • Operational and Financial Hits: Affected organizations face prolonged recovery efforts, with hackers maintaining undetected access for over a year in some cases. For instance, compromises in cloud and software firms risk cascading effects on downstream clients, potentially leading to widespread supply chain disruptions.
  • National Security Vulnerabilities: Targets include U.S. defense entities and think tanks, exposing military-related data and tracking capabilities that could compromise personnel and operations globally.

Beijing has denied involvement, emphasizing opposition to cyberattacks, but experts note the scale outpaces U.S. defensive resources, with Chinese hackers reportedly outnumbering FBI cyber agents 50-to-1.

Broader Implications for U.S. Industries

This surge aligns with rising U.S.-China tensions, including trade tariffs, amplifying risks for industries reliant on global supply chains. Defense, manufacturing, and tech sectors are particularly vulnerable due to their handling of sensitive IP and interconnected systems. The exploitation of edge devices and zero-days indicates a shift toward more persistent, stealthy operations, potentially feeding AI-enhanced espionage. A 2025 report from Mandiant highlights a 150% increase in China-linked activity, stressing the need for cross-sector collaboration to counter these threats. Without proactive measures, U.S. businesses risk regulatory scrutiny, financial penalties, and eroded trust.

Key Lessons and Recommendations

To defend against these state-sponsored threats, security and IT leaders should prioritize the following:

  • Patch and Harden Edge Devices: Immediately apply updates for known CVEs in products from Cisco, Fortinet, Ivanti, Palo Alto, and others. Implement regular vulnerability scanning and restrict exposed services.
  • Adopt Zero-Trust Architectures: Move beyond perimeter defenses by verifying all access, using multi-factor authentication (MFA), and segmenting networks to limit lateral movement.
  • Enhance Threat Detection and Response: Deploy AI-driven analytics for anomaly detection, monitor for IOCs like suspicious IPs and custom malware (e.g., Brickstorm scanner from Mandiant). Conduct regular employee training on phishing and social engineering.
  • Strengthen Supply Chain Security: Vet third-party vendors, require software bills of materials (SBOMs), and foster information sharing via frameworks like CISA’s guidelines.
  • Collaborate with Experts: Partner with federal agencies and cybersecurity firms for threat intelligence and incident response planning to reduce recovery times.

By applying these strategies, U.S. industries can transform these challenges into opportunities for enhanced security posture and innovation.

For tailored discussions on fortifying your defenses against state-sponsored threats, reach out to our team at info@harborcoattech.com.

Harborcoat | Protection against less tangible things

Follow us on X: @Harborcoattech | LinkedIn: Harborcoat