Chinese Hackers Escalate Attacks on Taiwan, 2.4M Daily Intrusions

Taiwan faces 2.4M daily intrusion attempts from Chinese threat actors in 2024, targeting critical infrastructure. U.S. regulators’ emails compromised in separate incident.
chinese-hackers-escalate-attacks-on-taiwan-24m-daily-intrusions chinese-hackers-escalate-attacks-on-taiwan-24m-daily-intrusions

Cybersecurity analysts are on high alert as Chinese threat actors escalate their attacks on Taiwanese government networks, doubling their intrusion attempts to a staggering 2.4 million per day in 2024. The persistent campaigns have targeted critical infrastructure and government systems, underscoring the growing cyber espionage threat from state-sponsored hackers.

In a separate incident, hackers compromised an administrator account at the U.S. Office of the Comptroller of the Currency in April 2025, gaining access to sensitive emails of over 100 bank regulators for more than a year. The attackers exfiltrated approximately 150,000 emails containing confidential financial institution data, raising concerns about the security posture of key regulatory agencies.

Cybersecurity experts analyzing network intrusion attempts
Source: Pexels Image

The global reach of cyber threats was further highlighted by U.S. Cyber Command’s discovery of Chinese malware implanted on partner networks across Latin America during ‘hunt forward’ operations. The findings underscore the ongoing risks posed by compromised supply chains and third-party vendors in an increasingly interconnected digital ecosystem.

Emerging Espionage Tactics Target Remote Workers, Federal Employees

North Korean cyber espionage campaigns have expanded their scope, targeting European defense and government sectors in April 2025. Attackers employed social engineering tactics, posing as remote workers to gain access and steal sensitive data from their former employers. The trend of exploiting telework vulnerabilities emphasizes the need for robust identity and access management controls.

Meanwhile, Iranian state-sponsored groups have been conducting espionage against Iraqi government entities and Yemeni telecommunications providers. The attackers leveraged custom backdoors and novel command-and-control techniques, such as hijacking email accounts for persistence and lateral movement within compromised networks.

In a concerning development, a network linked to a Chinese tech firm targeted recently laid-off U.S. federal employees through fake consulting firms advertising jobs online. The operation closely mirrored FBI warnings about foreign intelligence recruitment methods that use fraudulent job postings with non-functional contact details to lure unsuspecting victims.

Strengthening Cybersecurity Defenses in an Evolving Threat Landscape

To mitigate the growing wave of cyber threats, organizations must prioritize the review of privileged account activity, enhance email security controls, especially around Business Email Compromise (BEC), and conduct regular incident response exercises. As the threat landscape continues to evolve, staying vigilant and proactively addressing vulnerabilities will be crucial in safeguarding critical assets and data from determined adversaries.

Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use