Skip to content

Malicious Chinese Hackers Focus Assault on Taiwan's Microchip Sector

China-backed cybersecurity assaults intensify, as revealed by Proofpoint researchers, against Taiwan's crucial semiconductor sector. The data shows a systematic, widening operation by various state-supported hackers, aiming to breach and amass intelligence from this strategic industry. This...

Chinese Hackers Attempt Infiltration of Taiwan's Chipmaking Sector
Chinese Hackers Attempt Infiltration of Taiwan's Chipmaking Sector

Malicious Chinese Hackers Focus Assault on Taiwan's Microchip Sector

In the spring of 2025, a series of phishing campaigns were launched against Taiwan's critical semiconductor industry. Over a period of approximately three months, from March to June, at least three distinct China-aligned threat actors - UNK_FistBump, UNK_DropPitch, and UNK_SparkyCarp - were observed conducting these campaigns.

These phishing campaigns were not limited to a select few entities, but rather targeted a wide array of Taiwanese semiconductor companies. The threat actors employed a variety of tactics, such as using employment-themed lures, fictitious collaboration proposals, and credential phishing. They often utilised compromised university accounts or custom Adversary-in-the-Middle (AiTM) frameworks to execute their attacks.

Custom backdoors like Voldemort and HealthKick were deployed, along with the use of legitimate tools for persistence and remote access. The shared infrastructure patterns observed in these operations offer clues into the operational security of these state-backed groups. For instance, the analysis reveals the use of Russian VPS providers and SoftEther VPN servers.

Researchers from cybersecurity company Proofpoint have released new insights on these China-aligned cyber espionage operations. The findings reveal a concerted and expanding effort by multiple state-sponsored threat actors. The targeted semiconductor entities are vital to Taiwan's industry, and this surge in activity may reflect China's strategic goal of achieving semiconductor self-sufficiency and reducing reliance on international supply chains.

The increased activity could potentially be influenced by recent US and Taiwanese export controls. The intelligence gathered from these operations could potentially impact Australian businesses, as many rely on global tech supply chains. For Australian companies, understanding any potential business risks due to intellectual property theft from Taiwanese semiconductor companies is crucial.

The threat actors observed in these campaigns are adaptable, showcasing their ability to use a variety of tactics and tools. This highlights the need for vigilance and robust cybersecurity measures to protect against such threats. The phishing campaigns targeted various sectors within the semiconductor ecosystem, including financial analysis.

It is important to note that the three China-aligned cyber-attack groups conducting these phishing campaigns against various Taiwanese semiconductor companies between March and June 2025 are Mustang Panda, APT10, and Tonto Team. These groups have been associated with state-sponsored cyber espionage in the past.

In conclusion, the series of phishing campaigns against Taiwan's semiconductor industry serves as a reminder of the ongoing cyber threats posed by state-sponsored actors. As the world becomes increasingly interconnected, it is essential for businesses to remain vigilant and proactive in protecting their intellectual property and critical infrastructure.

Read also:

Latest