Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase

Redazione RHC : 30 June 2025 10:36

China’s growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some doubts remain about the ability to meet the challenge, given the heavy dependence on foreign suppliers and the lack of adequate cyber skills at the domestic level, which could negatively impact the availability of resources and manpower.

Industry experts point out that China has now converted the East Asian security ecosystem into a unique opportunity for itself. Since 2016, Beijing has embarked on a strategy of purchasing and acquiring unique hacking tools, intended for military and intelligence purposes, precluding the United States from access to such technologies. In contrast to the US approach, which is based on broad agreements, reliance and caution, the Chinese approach is versatile, decentralized and inclined to take calculated risks.

The authors of the report point out that developing exploits is becoming increasingly difficult and expensive. Reliable vulnerabilities require months of work, and the number of specialists capable of creating such tools is measured in the hundreds around the world. The United States relies heavily on the international research community, while China relies on its own large-scale education system, in which universities, competitions, and companies.

American contracts often go through large defense contractors, but small companies and individual developers create many of the most valuable tools. However, bureaucratic hurdles, a lack of legal support, and complex permitting discourage many. And the growing cybersecurity of American tech giants like Google and Apple makes the job even more difficult, while also limiting the ability to exploit them.

China, on the other hand,has actively integrated its tech companies into state-run computer programs. Vulnerabilities discovered in Chinese competitions or by researchers are often immediately passed on to the state. Instead of aiming for maximum secrecy, as the United States does, China is aiming for speed and mass distribution, without fear of reuse and disclosure of vulnerabilities. Thanks to this, a vulnerability can be exploited by multiple groups at the same time and its life cycle is significantly extended.

The authors of the report call for reforms in the United States. They propose the creation of vulnerability research accelerators, increased funding for hacker clubs and competitions, simplified procurement procedures and strengthened protection for researchers. They also propose creating a government center to work directly with exploit providers and attract foreign specialists, without prioritizing authoritarian methods.

If the United States wants to maintain its advantage in cyberspace, it will have to seriously reconsider its approach to offensive cyberpower. Without this, the authors argue, the country risks losing key positions in the digital war to China.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli