Taiwan Says China Accounts for Most Cyber AttacksTaiwan Says China Accounts for Most Cyber Attacks
Neighboring countries battle it out with secret cyber armies of hackers, report says
January 17, 2008
Taiwan officials say that 99 percent of cyber attacks on their government computers came from IP addresses in China, according to a published report in The Asahi Shimbun.
For over four years, personal computers of Taiwan's top government officials and lawmakers associated with military and foreign affairs have been systematically hacked -- mostly via Trojan malware infections. A senior official from the National Security Council in Taiwan says the cyber threat is "one of the most important 'hidden' issues for the security of Taiwan," according to the report.
Taiwanese officials said three to five people were behind the China-based attacks, which originated from several different provinces, including Beijing and Fujian. Some members of the media and scientists have also been hacked.
Taiwan and China reportedly have established so-called cyber attacker "troops," although neither country will admit the existence of these hacker soldiers, the report says. One Taiwanese security editor found a common thread in the attacks out of China: They typically began around 7 a.m. and lasted until noon, with a two-hour break before continuing until sometime in the evening.
"They (Chinese hackers) faithfully fulfill their mission as government staff, unlike private-sector hackers who rejoice by rewriting the front pages of Websites. They gave me an impression that they attack Websites in the same manner as a machine," he said.
— Kelly Jackson Higgins, Senior Editor, Dark Reading
About the Author(s)
You May Also Like
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks