web analytics

China-linked hackers target Taiwan chip firms in a coordinated espionage campaign – Source: www.csoonline.com

Rate this post

Source: www.csoonline.com – Author:

Three threat groups conduct sophisticated phishing attacks against chip manufacturers and financial analysts between March and June 2025.

Chinese state-sponsored hackers have launched sophisticated espionage campaigns against Taiwan’s semiconductor industry, marking a dramatic escalation from sporadic attacks to sustained, coordinated operations.

Between March and June 2025, three distinct threat groups were found conducting coordinated espionage campaigns targeting chip manufacturers, supply chain companies, and financial analysts to steal critical intellectual property and market intelligence, researchers said in a report.

According to research from cybersecurity firm Proofpoint, the campaigns represent unprecedented coordination and sophistication. “The targeted companies range from medium-sized businesses to large global enterprises,” said Mark Kelly, threat researcher at Proofpoint.

The targeting extended beyond traditional semiconductor companies to include “individuals at major international investment firms specializing in Taiwanese semiconductor investment analysis,” Kelly added.

The surge comes as China faces mounting pressure from US semiconductor export controls that have limited Beijing’s access to advanced chip-making technology. Taiwan hosts the world’s most advanced semiconductor manufacturing capabilities, making it a prime target as China seeks technological self-sufficiency.

Advanced threat actor coordination

Security experts say the campaigns represent a notable evolution in Chinese cyber operations. “This escalation marks a sharp uptick in both sophistication and focus compared to earlier campaigns,” said Ibrahim Saify, researcher at CloudSEK. “Where older campaigns were broader in scope, today’s intrusions are more precise, covert, and aligned with China’s national semiconductor development agenda.”

Manish Rawat, semiconductor analyst at TechInsights, emphasized the coordinated nature of the attacks. “Multiple Chinese state-linked threat actors operated in parallel, suggesting a coordinated strategic push,” he said. “This shift signals a move from generic IP theft toward more precise, human-focused intrusions.”

One campaign involved hackers posing as job-seeking graduate students from Taiwanese universities. Researchers designated this group UNK_FistBump, which targeted semiconductor organizations using employment lures. “Posing as a graduate student seeking employment, the actor used compromised Taiwanese university email addresses to send their phishing email to recruitment and HR personnel,” the researchers said in the report.

The attacks featured subject lines in Traditional Chinese, and UNK_FistBump’s campaign featured a dual-payload approach, with a single archive containing two infection chains—one deploying Cobalt Strike and another delivering the custom Voldemort backdoor.

Investment banks in the crosshairs

A second group, UNK_DropPitch, targeted the financial ecosystem surrounding Taiwan’s semiconductor industry. This group conducted phishing campaigns against investment banks, focusing on individuals specializing in Taiwanese semiconductor analysis. The phishing emails purported to come from fictitious financial firms seeking collaboration opportunities.

The third group, UNK_SparkyCarp, focused on credential harvesting through sophisticated phishing kits using custom adversary-in-the-middle frameworks targeting Taiwanese semiconductor companies, with emails masquerading as account login security warnings.

The targeting pattern reveals China’s comprehensive approach to intelligence gathering. Rawat noted that the espionage focus extends beyond traditional chipmakers to include “testing firms, supply chain players, and even financial analysts, indicating a broad attempt to map the full value chain and anticipate market dynamics.”

This represents what Saify described as cyber operations becoming “a force multiplier — used to shortcut R&D cycles, replicate advanced fabrication processes, and undermine competitors.”

Geopolitical technology competition

The intensified targeting reflects escalating US-China tech rivalry.

“There is a tech ‘cold war’ going on between the US and China that has escalated with all the export controls barring China from accessing semiconductors,” said Neil Shah, VP for Research at Counterpoint Research. “Both nations want to be self-sufficient, as semiconductors are the new crude with AI the new oil.”

The Biden administration has imposed sweeping export controls on China’s access to advanced semiconductors and chip-making equipment, creating significant pressure on China to develop domestic alternatives or acquire foreign technology through other means.

Kelly noted that “the activity aligns with China’s long-term objectives for semiconductor self-sufficiency which have likely been further fuelled by international export controls.” The attacks weren’t concentrated in any particular region, spanning across Taiwan.

Enterprise security recommendations

Security experts emphasize that semiconductor companies must fundamentally rethink their cybersecurity approaches. “Firms in the semiconductor industry must recognize that they are now on the frontlines of geopolitical cyber warfare,” Saify said.

Rawat recommended that companies “evolve from traditional compliance-based cybersecurity to proactive, intelligence-driven defense.” He particularly emphasized heightened vigilance in monitoring insider threats and HR platforms, which are being exploited through employment-themed phishing campaigns.

Key defensive measures include closing the gap between IT and operational technology security, strengthening software supply chain security, and actively participating in intelligence-sharing networks with government agencies and industry peers.

Despite the sophisticated nature of these campaigns, early detection helped limit their impact. “Proofpoint notified all targeted organizations of this activity, and we are not aware of any compromise as a result of these campaigns,” Kelly said.

However, the threat remains active and evolving. Kelly noted that Proofpoint considers the threat “ongoing at this time.”

The semiconductor industry now finds itself at the center of a broader digital battleground where, as Shah puts it, “Taiwan unfortunately finds itself right in the middle of this battle.” As export controls and technological competition intensify, cybersecurity professionals expect these sophisticated espionage campaigns to continue evolving in both scope and sophistication.

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.

Original Post url: https://www.csoonline.com/article/4024013/china-linked-hackers-target-taiwan-chip-firms-in-a-coordinated-espionage-campaign.html

Category & Tags: Cyberattacks, Security – Cyberattacks, Security

Views: 6

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post