Cybersecurity firm reports increased Chinese hacker attacks targeting Taiwanese organizations.


A cybersecurity intelligence firm has revealed that a suspected Chinese state-sponsored hacking group, identified as RedJuliett, has significantly intensified its targeting of Taiwanese organizations. This uptick in cyberattacks has been particularly focused on sectors crucial to Taiwan’s infrastructure, including government entities, educational institutions, technology firms, and diplomatic bodies.

Recorded Future, the cybersecurity firm behind the report, noted that the cyber intrusions occurred prominently between November 2023 and April 2024. This period coincided with Taiwan’s presidential elections in January and subsequent changes in administration, highlighting the strategic timing of these attacks.

While RedJuliett has historically targeted Taiwanese entities, the recent wave of attacks represents an unprecedented scale of operation, according to an analyst from Recorded Future who spoke on condition of anonymity due to safety concerns.

The report detailed that RedJuliett’s operations extended beyond Taiwan, encompassing a total of 24 organizations across various locations, including government agencies in countries like Laos, Kenya, and Rwanda. Additionally, religious organizations’ websites in Hong Kong and South Korea, along with universities in the United States and Djibouti, were compromised. However, the specific identities of these institutions were not disclosed in the report.

One of the primary vulnerabilities exploited by RedJuliett was found in SoftEther, an enterprise-grade virtual private network (VPN) software used by several organizations to facilitate remote network access. By leveraging this vulnerability, RedJuliett attempted unauthorized access to the servers of over 70 Taiwanese organizations, including universities and tech companies involved in critical sectors like optoelectronics and facial recognition.

Recorded Future emphasized that RedJuliett’s modus operandi closely aligns with tactics typically associated with Chinese state-sponsored cyber espionage. Based on the geographical origins of IP addresses, the group is believed to operate out of Fuzhou, a city in China’s Fujian province facing Taiwan’s coast. This proximity suggests that Chinese intelligence services stationed in Fuzhou are likely tasked with gathering intelligence to inform Beijing’s policies on cross-strait relations.

The firm’s report underscored that RedJuliett’s primary objective appears to be intelligence gathering to support Chinese policy-making regarding Taiwan. This strategic cyber campaign reflects Beijing’s heightened geopolitical tensions with Taipei, exacerbated by recent military maneuvers and diplomatic pressures imposed on Taiwan by China.

Despite these revelations, both Taiwan’s Ministry of Foreign Affairs and China’s foreign ministry refrained from immediate comments on the report’s findings.

In the context of global cybersecurity dynamics, Recorded Future highlighted that Chinese state-sponsored cyber activities, including those attributed to RedJuliett, are part of broader international concerns. The United States and Britain have previously accused China of extensive cyber espionage, targeting millions worldwide. In response, China has consistently denied engaging in state-sponsored hacking, instead positioning itself as a victim of cyberattacks.

Looking ahead, Recorded Future anticipates ongoing targeting of Taiwanese government agencies, universities, and technology firms by Chinese state-sponsored groups. These entities are particularly vulnerable through public-facing devices such as open-source VPN software, which often lack robust visibility and logging capabilities.

To mitigate such cyber threats, organizations are advised to prioritize cybersecurity measures, including timely patching of vulnerabilities as they are identified. This proactive approach can significantly bolster defenses against sophisticated cyber intrusions orchestrated by state-sponsored actors like RedJuliett.


Please enter your comment!
Please enter your name here

Enable Google Transliteration.(To type in English, press Ctrl+g)