PH Days of Infiltration China’s Cyber Army Floods Global Conference with fake submissions
As 6,649,900 seconds tick down until Positive Hack Days 2025, Russia’s notorious cyber festival and FSB grooming ground, China has launched a full-scale cognitive warfare assault to sabotage an international cybersecurity conference. The motive? Retaliation for deep cyber intrusions into its critical infrastructure—breaches that Beijing is desperately trying to pin on Western actors while the real culprit, Moscow’s own cyber mercenaries, watches from the shadows.
While Positive Hack Days Media smugly declares, “Yes, now our channel is called Positive Hack Days Media again”, the cyber festival is anything but positive for the rest of the world. Behind the scenes, FSB-backed cyber operatives, operating under the guise of a “conference,” are nurturing the next wave of Russian state-sponsored hackers, reinforcing Putin’s war machine, and tightening the Kremlin’s iron grip on digital espionage. More than 130,000 people attended last year, they boast—conveniently leaving out how many were affiliated with APT28, Sandworm, or Russia’s Federal Security Service itself.
But this year, Russia’s cybersecurity circus has been met with an unexpected wildcard: China’s full-throttle, scorched-earth retaliation campaign. Having found itself on the receiving end of highly sophisticated cyber intrusions, Beijing has turned its ire not just toward Western institutions, but also toward its supposed “strategic partner,” Russia. And in true Chinese fashion, the response isn’t just cyber—it’s a total battlefield of disinformation, sabotage, and outright conference destruction.
China’s Cyber Sabotage: The Conference That Never Stood a Chance
The Chinese Communist Party (CCP) has mobilized an army of cyber mercenaries, automated bots, and state-backed disinformation agents to flood the international cybersecurity conference with fake submissions, bot-driven spam, and derailing narratives, ensuring that the event—originally intended as a forum for real security discussions—collapses under the sheer weight of its own infiltration.
What’s happening here is no accident. This is a play straight out of Beijing’s cognitive warfare manual, a deliberate “flood-the-zone” strategy designed to weaponize information, drown truth in an ocean of noise, and render legitimate cybersecurity dialogue completely useless.
Thousands of fake accounts, pretending to be experts, have submitted gibberish proposals, forcing conference organizers into an impossible battle against an AI-powered tsunami of fraudulent content.
Mass disinformation campaigns, executed across Telegram, Twitter, and compromised media outlets, are amplifying Beijing’s propaganda that the conference itself is a Western intelligence front, hoping to scare off legitimate participants.
Russian-aligned speakers and FSB-connected attendees are being quietly blacklisted, as China sows division within its own supposed alliance, ensuring that Moscow’s cyber warriors are left out in the cold while Beijing’s operatives wreak havoc from the inside.
Deepfake-enhanced sabotage is targeting key cybersecurity figures, discrediting them with fabricated speeches and false statements that appear to show them colluding with adversarial intelligence agencies—a tactic China has perfected through its state-controlled “cyber sovereignty” doctrine.
The Irony: Russia’s Frankenstein Monster Comes to Life
The bitter irony of this unfolding cyberwarfare circus is that Russia itself taught China many of these tactics. Disinformation, cognitive subversion, infiltration through cyber forums—these were hallmarks of Russian cyber operations long before China fully mastered them. Moscow’s FSB-backed troll farms had long been the kings of digital subversion, flooding the internet with fabricated narratives, manufactured outrage, and social engineering at scale.
Yet now, the Kremlin is watching in real time as China turns these very weapons against it.
The cyber intrusions into China’s critical infrastructure, which prompted this full-scale retaliation, are suspected to have originated from Russian-affiliated cyber units—perhaps rogue mercenaries once under Moscow’s control, or Kremlin-backed hackers acting outside their original remit. Either way, Beijing is convinced that Russia is playing both sides—pretending to be an ally while quietly exploiting China’s vulnerabilities for its own gain.
And what does Russia’s cybersecurity circus at PHDays do in response? Nothing. Because to admit that China is actively sabotaging a global conference would be to admit that Moscow has lost control over its cyber battlefield.
What’s Next? The Unfolding Digital Cold War
China’s campaign to destroy the conference isn’t a one-time event—it’s a template for future cyber retaliation operations. Beijing has now set a precedent: if a global cybersecurity forum even hints at discussing breaches into Chinese systems, it will be reduced to digital rubble.
This is a new Cold War playing out in cyberspace:
Russia’s Positive Hack Days continues as a thinly veiled FSB talent-scouting operation, feeding recruits into cyber units responsible for hacking Western infrastructure.
China, having realized that Moscow is no longer a trustworthy partner, is systematically dismantling Russia’s influence in global cyber forums, ensuring that Beijing—not the Kremlin—dictates the next era of digital warfare.
Western cybersecurity experts, now forced to navigate an escalating conflict between two cyber superpowers, are caught in the crossfire of information manipulation, espionage, and outright cyberwarfare.
As PHDays Fest 2025 marches forward, promising yet another propaganda-fueled recruitment drive for Russia’s elite hacker cadre, one truth has become undeniably clear:
The biggest threats in cybersecurity are no longer just lone actors or criminal enterprises. They are entire nations, engaged in a shadow war where the battlefield isn’t land or air, but information itself.
