Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Proofpoint. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Proofpoint or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Phish, Chips & Voldemort: Inside China’s Cyber Targeting of Taiwan

42:53
 
Share
 

Manage episode 499765334 series 3348167
Content provided by Proofpoint. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Proofpoint or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Send us fan mail!

Hello to all our Cyber Panda Bears! In this extra-packed episode of Discarded, host Selena Larson and guest host, Sarah Sabotka reunite with Staff Threat Researcher Mark Kelly to dive deep into China-aligned espionage activity—this time with a focus on Taiwan’s semiconductor ecosystem and the strange, stealthy tools threat actors are using to get in.

Mark walks us through Proofpoint’s latest research on custom malware (yes, “Voldemort” is back), threat clusters with pun-filled names like UNK_SparkyCarp and UNK_DropPitch, and why Taiwan’s chip industry has become such a hot target. From design and manufacturing to financial analysts and supply chains, Chinese state-aligned actors are getting more creative—and more persistent.

We also unpack:

  • The “Phish & Chips” campaign and how it fits into China’s broader geopolitical strategy

  • Why pop culture references like Voldemort and Mr. Robot keep showing up in espionage infrastructure

  • Attribution headaches, including Proofpoint’s tracking of multiple unattributed threat clusters with UNK designators

  • How AI, LLMs, and adversary-in-the-middle phishing are influencing espionage tactics

  • The use of RMM tools and spoofed MacOS folders for stealth

  • Why basic backdoors are making a strategic comeback

  • A threat intel team’s deep love for vegetables, puns, and report titles

Whether you're tracking state-sponsored cyber activity, curious about weird malware names, or just here for the expert banter, this episode has you covered.

Resources Mentioned:

Phish & Chips: Chinese Espionage Activity Targeting Taiwan's Semiconductor Ecosystem

For more information about Proofpoint, check out our website.

Subscribe & Follow:

Stay ahead of emerging threats, and subscribe! Happy hunting!

  continue reading

88 episodes

Artwork
iconShare
 
Manage episode 499765334 series 3348167
Content provided by Proofpoint. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Proofpoint or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Send us fan mail!

Hello to all our Cyber Panda Bears! In this extra-packed episode of Discarded, host Selena Larson and guest host, Sarah Sabotka reunite with Staff Threat Researcher Mark Kelly to dive deep into China-aligned espionage activity—this time with a focus on Taiwan’s semiconductor ecosystem and the strange, stealthy tools threat actors are using to get in.

Mark walks us through Proofpoint’s latest research on custom malware (yes, “Voldemort” is back), threat clusters with pun-filled names like UNK_SparkyCarp and UNK_DropPitch, and why Taiwan’s chip industry has become such a hot target. From design and manufacturing to financial analysts and supply chains, Chinese state-aligned actors are getting more creative—and more persistent.

We also unpack:

  • The “Phish & Chips” campaign and how it fits into China’s broader geopolitical strategy

  • Why pop culture references like Voldemort and Mr. Robot keep showing up in espionage infrastructure

  • Attribution headaches, including Proofpoint’s tracking of multiple unattributed threat clusters with UNK designators

  • How AI, LLMs, and adversary-in-the-middle phishing are influencing espionage tactics

  • The use of RMM tools and spoofed MacOS folders for stealth

  • Why basic backdoors are making a strategic comeback

  • A threat intel team’s deep love for vegetables, puns, and report titles

Whether you're tracking state-sponsored cyber activity, curious about weird malware names, or just here for the expert banter, this episode has you covered.

Resources Mentioned:

Phish & Chips: Chinese Espionage Activity Targeting Taiwan's Semiconductor Ecosystem

For more information about Proofpoint, check out our website.

Subscribe & Follow:

Stay ahead of emerging threats, and subscribe! Happy hunting!

  continue reading

88 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play