ASD leads global strike on cyber crooks | Rare China-linked hack hits Russian tech firm | China accessed classified UK systems for a decade
Summary
The latest Daily Cyber & Tech Digest rounds up three major stories: Australia’s Signals Directorate (ASD) is intensifying offensive cyber operations and disrupting Russian cybercriminal networks with Five Eyes partners; Symantec reports a rare Chinese state-linked intrusion into a Russian IT provider’s build and code repositories — suggesting supply-chain espionage; and former UK officials say Chinese actors accessed low- and medium-classified UK government systems for over a decade, raising political and security concerns.
Key Points
- ASD is rapidly expanding under the $10bn REDSPICE programme to double staff and boost offensive cyber, AI and quantum capabilities while prioritising disruption of cybercriminals.
- ASD’s operations, working with Five Eyes, focus on disrupting Russian cybercriminal infrastructure and protecting critical infrastructure and election systems.
- Symantec attributes a January–May 2025 breach of a Russian IT provider’s build and code systems to the Chinese-linked group “Jewelbug”, possibly aiming for a software supply-chain foothold.
- Jewelbug reportedly used Yandex Cloud to obfuscate activity, showing sophisticated tradecraft and an unusual instance of Chinese actors targeting a Russian entity.
- UK officials say Chinese state actors systematically accessed official-sensitive and some secret UK systems for more than ten years, though top-secret data was reportedly not compromised.
- The disclosure about UK compromises has domestic political implications and amplifies concerns about data-centre ownership and long-term espionage risks.
- These incidents underscore a broader trend: state and criminal cyber operations increasingly target supply chains, government networks and critical infrastructure across allied states.
Content summary
Abigail Bradshaw, head of Australia’s ASD, describes the agency as one of the busiest government arms as it scales up under REDSPICE. ASD is investing in offensive cyber, AI and quantum capabilities and is prioritising active disruption of cybercriminal networks—particularly those linked to Russia—over simply collecting stolen data.
Cybersecurity firm Symantec reported that a suspected Chinese state-linked cluster called Jewelbug breached a Russian IT provider’s build and code repositories earlier in 2025. The intrusion is notable because it targets a supposed partner country and appears aimed at supply-chain compromise; attackers used cloud infrastructure to hide activity.
Separately, former senior UK security officials told Bloomberg that Chinese actors had systemically accessed low- and medium-classified UK government systems for more than a decade, including policy documents and diplomatic communications. While the most highly classified data reportedly stayed secure, the revelations raise questions about long-term access, data-centre ownership and political fallout for the UK government.
Context and relevance
These stories collectively highlight how state actors and well-resourced criminal groups are evolving their tactics: supply-chain intrusions, long-term covert access to government networks, and coordinated disruption operations by allied intelligence agencies. For security teams, policymakers and tech leaders, the takeaways are clear — invest in supply-chain security, assume persistent adversary presence, and expect closer collaboration (and friction) among intelligence partners as defensive and offensive postures shift.
Why should I read this?
Short version: if you worry about software you run, the servers that host your government data, or the next headline-making cyber incident — this saves you time. Big players are moving from theft to disruption and long-term access, and that changes how organisations should defend themselves. Read it so you’re not the one surprised by the next supply-chain or state-backed breach.
Author style
Punchy: these are not isolated hacks — they’re signals of a maturing, aggressive cyber landscape. The ASD expansion, the rare China-on-Russia intrusion, and a decade-long compromise of UK systems together make this briefing essential reading for security professionals and policymakers.
Source
Source: https://aspicts.substack.com/p/asd-leads-global-strike-on-cyber