US-based cybersecurity firm claims that attack on Taiwan increased by China-backed hackers

Cybersecurity. Photo Courtesy: Unsplash

#Cybersecurity, #Taiwan, #China, #RecordedFuture

IBNS-CMEDIA: A suspected China-backed hacking group has stepped up attacks on organisations in Taiwan, media reports said.

According to reports, the move was made as a part of Beijing’s intelligence-gathering activities on the self-governing island.

The hacking group, RedJuliett, compromised two dozen organisations between November 2023 and April of this year, likely in support of intelligence collection on Taiwan’s diplomatic relations and technological development, Al Jazeera reported quoting cyber security firm Recorded Future’s report.

RedJuliett exploited vulnerabilities in internet-facing appliances, such as firewalls and virtual private networks (VPNs), to compromise its targets, which included tech firms, government agencies and universities, the United States-based cybersecurity firm said.

RedJuliett also conducted “network reconnaissance or attempted exploitation” against more than 70 Taiwanese organisations, including multiple de facto embassies, according to the firm.

“Within Taiwan, we observed RedJuliett heavily target the technology industry, including organisations in critical technology fields. RedJuliett conducted vulnerability scanning or attempted exploitation against a semiconductor company and two Taiwanese aerospace companies that have contracts with the Taiwanese military,” Recorded Future said in its report.

“The group also targeted eight electronics manufacturers, two universities focused on technology, an industrial embedded systems company, a technology-focused research and development institute, and seven computing industry associations.”

The cyber security firm said it expected Chinese state-sponsored hackers to continue targeting Taiwan for intelligence-gathering activities.

“We also anticipate that Chinese state-sponsored groups will continue to focus on conducting reconnaissance against and exploiting public-facing devices, as this has proved a successful tactic in scaling initial access against a wide range of global targets,” the cybersecurity firm said.