As White House moves to send AI chips to China, Trump’s DOJ prosecutes chip smugglers

CyberScoop

Overview

The Department of Justice is prosecuting individuals involved in smuggling computer chips to China, labeling these actions as a significant threat to U.S. national security. This comes at a time when the White House is considering sending AI chips to China, prompting criticism from some Democrats who are concerned about the implications of such a move. The ongoing legal actions against chip smugglers highlight the complexities of international trade and security, especially regarding sensitive technology. The situation raises questions about how the U.S. balances its technological advancements with national security interests, particularly in relation to China. As these prosecutions unfold, they may influence future policies on technology exports and international relations.

Key Takeaways

  • Affected Systems: Computer chips, AI chips
  • Timeline: Ongoing since recent months

Original Article Summary

Prosecutors called criminal schemes to route computer chips to China a threat to U.S. national security, while Democrats have criticized the White House’s decision. The post As White House moves to send AI chips to China, Trump’s DOJ prosecutes chip smugglers appeared first on CyberScoop.

Impact

Computer chips, AI chips

Exploitation Status

No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.

Timeline

Ongoing since recent months

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Coverage

ROCA: Infineon TPM and Secure Element RSA Vulnerability Guidance

NCSC Feed

The ROCA vulnerability affects certain Infineon Trusted Platform Modules (TPMs) and Secure Elements, which are used in various devices for secure cryptographic functions. This flaw allows attackers to potentially recover private RSA keys, compromising the security of encrypted communications and data for users. Devices that utilize these components could be at risk, making it crucial for manufacturers and users to assess their systems. The vulnerability is significant because it could expose sensitive information and undermine trust in security protocols. Users and organizations that rely on affected devices need to take immediate action to secure their systems and protect their data.

Feb 28, 3025

Cyber Assessment Framework 3.2

NCSC Feed

The latest version of the Cyber Assessment Framework (CAF) has been released, aiming to address the rising threats to critical national infrastructure. This update emphasizes the need for organizations to reassess their cybersecurity strategies in light of evolving risks. The framework aims to provide guidance on how to enhance resilience against potential cyberattacks that could impact essential services and systems. It is particularly relevant for government agencies, utility providers, and other sectors that rely on critical infrastructure. By adopting the updated CAF, organizations can better prepare for and mitigate the risks posed by increasingly sophisticated cyber threats.

Jan 22, 2277

Europe’s DMA raises new security worries for mobile ecosystems

Help Net Security

A new report from the Center for Cybersecurity Policy and Law raises concerns about mobile security as the European Union's Digital Markets Act (DMA) takes effect. The DMA mandates that major platform providers allow third-party developers access to key software and hardware features for better interoperability. While this aims to foster competition, experts warn it could weaken the security controls that have traditionally protected mobile devices. As apps and services become more interconnected through these new regulations, there is a risk that vulnerabilities could be introduced, potentially exposing user data and device integrity. This shift could affect millions of users across various mobile ecosystems, raising urgent questions about how security will be maintained in a more open environment.

Dec 15, 2025

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

The Hacker News

CyberVolk, a pro-Russian hacktivist group, has launched a new ransomware-as-a-service (RaaS) called VolkLocker, which has a significant flaw. Researchers from SentinelOne discovered that VolkLocker contains a hard-coded master key, allowing victims to decrypt their files without paying the ransom. This ransomware, which surfaced in August 2025, targets Windows systems and is part of an ongoing trend of ransomware attacks that can disrupt businesses and individuals alike. The presence of this flaw means that while the ransomware may still be a concern, victims have a potential way to recover their data without succumbing to the attackers' demands. This incident underscores the ongoing battle between cybercriminals and security researchers, as vulnerabilities in ransomware can lead to unexpected outcomes for victims.

Dec 15, 2025

Beware: PayPal subscriptions abused to send fake purchase emails

BleepingComputer

A new email scam is exploiting PayPal's subscription feature to send deceptive purchase notifications. These emails appear legitimate as they come from PayPal but contain links directing users to fraudulent sites. The scam takes advantage of the way PayPal's subscription system generates email notifications, making it challenging for recipients to discern the authenticity of the messages. Users who fall for these scams could inadvertently share personal information or financial details with malicious actors. It's crucial for PayPal users to be cautious when receiving unexpected purchase notifications and to verify any claims before taking action.

Dec 14, 2025

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 75

Security Affairs

The latest Security Affairs Malware Newsletter highlights several significant malware developments affecting multiple countries. Notably, the UDPGangster campaigns are targeting various regions, posing risks to users and organizations. Researchers also discuss ransomware trends related to the Bank Secrecy Act, shedding light on how financial institutions might be affected between 2022 and 2024. Additionally, the return of the ClayRat malware introduces expanded features and techniques that could complicate detection and mitigation efforts. Another concerning finding is the SEEDSNATCHER, an Android malware that targets crypto wallets, raising alarms for cryptocurrency users. These incidents highlight the evolving tactics employed by cybercriminals and the need for heightened security measures.

Dec 14, 2025