Between March and June 2025, cybersecurity researchers at Proofpoint documented an alarming escalation in Chinese state-sponsored cyber espionage targeting Taiwan’s critical semiconductor industry.
Three distinct threat actors launched sophisticated phishing campaigns against manufacturers, designers, and financial analysts specializing in semiconductor technologies, marking a significant intensification of China’s cyber intelligence operations in this strategically vital sector.
The most prominent of these operations involved UNK_FistBump, a Chinese threat actor that conducted elaborate employment-themed phishing campaigns in May and June 2025.
Masquerading as graduate students from prestigious Taiwanese universities, the attackers sent weaponized job applications to recruitment and HR personnel at major semiconductor companies.
The emails contained subject lines in Traditional Chinese, such as “Product Engineering (Material Analysis/Process Optimization) – National Taiwan University.” They included password-protected archives or PDF attachments linking to malicious payloads.
In an unprecedented tactical evolution, UNK_FistBump deployed dual infection chains within a single campaign, delivering both Cobalt Strike Beacon payloads and a custom backdoor called Voldemort.
The Cobalt Strike variant utilized a customized GoToMeeting malleable command-and-control profile, communicating with infrastructure at IP address 166.88.61.35 over port 443.
Meanwhile, the Voldemort backdoor employed Google Sheets for covert command-and-control operations, demonstrating the attackers’ sophisticated understanding of legitimate cloud services for malicious purposes.
The technical implementation of these attacks showcased remarkable sophistication. UNK_FistBump employed DLL sideloading techniques using legitimate signed executables, including javaw.exe and CiscoCollabHost.exe, to load malicious libraries that decrypt and execute their payloads.
The RC4-encrypted Cobalt Strike payload utilized the key “qwxsfvdtv” and established persistence by modifying the Windows Registry.
Concurrently, UNK_DropPitch targeted investment analysts specializing in Taiwanese semiconductor markets, deploying a custom backdoor called HealthKick through fake investment collaboration emails.
This malware employed a FakeTLS protocol requiring duplicate headers due to apparent coding errors, communicating with C2 servers using XOR encryption with the key “mysecretkey.”
The timing and scope of these operations align with China’s strategic priority to achieve semiconductor self-sufficiency amid intensifying U.S. export controls and technology restrictions.
The targeting extended beyond traditional manufacturing entities to include supply chain partners and financial analysts, indicating comprehensive intelligence collection efforts spanning the entire semiconductor ecosystem.
Proofpoint researchers noted that established Chinese threat actors have increasingly shifted toward exploiting edge devices and alternative access vectors.
At the same time, newer groups, such as those documented in this campaign, continue to employ traditional phishing methodologies.
The emergence of multiple threat actors simultaneously targeting the same sector suggests coordinated state-level prioritization of semiconductor intelligence collection, potentially foreshadowing expanded operations against this critical industry worldwide.
| UNK_FistBump Network Indicators | |||
| Indicator | Type | Description | First Seen |
| 166.88.61[.]35 | IP address | Cobalt Strike C2 | May 2025 |
| hxxps://sheets[.]googleapis[.]com:443/v4/spreadsheets/1z8ykHVYh9DF-b_BFDA9c4Q2ojfrgl-fq1v797Y5576Y | URL | Voldemort Google Sheets C2 | May 2025 |
| hxxps://sheets[.]googleapis[.]com:443/v4/spreadsheets/14H0Gm6xgc2p3gpIB5saDyzSDqpVMKGBKIdkVGh2y1bo | URL | Voldemort Google Sheets C2 | June 2025 |
| john.doe89e@gmail[.]com | Malware delivery | May 2025 | |
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…