

How did China get Microsoft's zero-day exploits?
13 snips Jul 10, 2025
Discover the fascinating case of the first arrest of a Chinese intelligence-linked hacker in Italy. The discussion delves into the notorious HAFNIUM group, uncovering how they accessed Microsoft Exchange zero-days. Analyze the competitive cyber capabilities between the U.S. and China, and explore the rise of 'cyber militias' in the region. The episode also tackles cybersecurity challenges related to young offenders, the impact of drone technology in warfare, and the effectiveness of current cybersecurity tools.
AI Snips
Chapters
Transcript
Episode notes
Hafnium's Exploit Shadow
- Hafnium was a mysterious Chinese threat group that vanished in public view due to widespread exploitation of their discovered vulnerabilities.
- The original exploit landscape became a chaotic free-for-all, drowning out awareness of Hafnium itself.
How Hafnium Accessed Exploits
- The same Microsoft Exchange zero-days were discovered by researcher Orange Tsai and exploited by Hafnium, raising questions about leakage or insider access.
- Chinese actors likely obtained the exploits during the Microsoft patch cycle, indicating possible insider compromise at Microsoft or with the researcher.
China Uses Civilian Hackers Proxy
- Chinese state hacking often uses civilians working for private companies as proxies rather than formal military or intelligence personnel.
- This approach makes arrests like the recent one in Italy of a Chinese intelligence-linked hacker legally and diplomatically unique.