Taiwanese Hackers Accused Of Attacking China

China’s top spy agency, the State Security Ministry (MSS), has said that four individuals probably linked to Taiwan’s military are cyber attacking mainland China. The MSS identified the suspects as members of Taiwan’s Information, Communications, and Electronic Force Command (ICEFCOM) within the defence ministry. 

There have been cyber attacks on China targeting key infrastructure, including power grids, water supplies and telecommunications networks since 2023 and the MSS claim that ICEFECOM has hired hackers and cyber security firms to conduct Taiwan government-directed cyber attacks. 

The MSS report revealed the names and photographs of Taiwanese military personnel accused of being ICEFCOM operatives. These include Lin Yushu, head of the Network Environment Research and Analysis Centre of the “Information, Communications and Electronic Force Command”, Cai Jiehong, team leader of the centre, plus two others. 

In a statement the Taiwanese Prime Minister Cho Jung-tai denied China’s allegations, saying MSS had fabricated them “in order to justify their own ongoing cyberattacks against Taiwan.” ICEFCOM said that its operations focus on national defence not cyber attacks on China, claiming that the accusations are aimed at intimidating the Taiwanese people. 

Taiwan and China’s  have a complex historic relationship which extends to cyberspace and Taiwanese security officials have consistently blamed  Chinese hackers for cyber attacks targeting the nation. In return, China accuses Taiwan of conducting cyber operations against the mainland and has recently begun publicly identifying the alleged threat actors behind the attacks. 

China first publicly named alleged Taiwanese hackers in 2024 when the MSS reported on Anonymous 64, a purported hacktivist group that China claims is actually operated by Taipei, according to Dakota Cary, a China expert  at cyber security firm SentinelOne.

Three Chinese cyber security firms QiAnXin, Antiy and Anheng Information have published separate reports detailing the activities of an alleged Taiwan-linked state threat actor tracked as APT-Q-20. They say that the group has been active since 2006 and has targeted government, military, defence, and scientific research institutions in China to obtain sensitive data. 

Gov.CN    |   SCMP   |   Radio Taiwan   |   Focus Taiwan  |  The Record   |   Taiwan National Security Bureau 

Image: Ideogram

You Might Also Read: 

China's Surveillance State Extends Beyond Its Borders:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Combatting Rising AI Attacks With AI-Powered Defences 
MS Windows Zero Day Vulnerability Widely Exploited »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Opscura

Opscura

Opscura (formerly Enigmedia) brings the reliable and cautious hands of operations together with the analytical minds of cyber experts and cryptography researchers.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

SHIELD

SHIELD

SHIELD is an established end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node is part of a national network designed to foster and accelerate cyber capability and innovation across Australia.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

ThreatLocker

ThreatLocker

The ThreatLocker Platform provides a Zero Trust security solution that offers a unified approach to protecting users, devices, and networks against the exploitation of zero day vulnerabilities.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

Edge Security

Edge Security

Edge Security is an information security research and consulting firm of expert hackers.