The threat from state-sponsored cyberattacks on the nation’s digital infrastructure, including those directed by Beijing-affiliated groups, has increased in sophistication and severity over the past year, the Department of Cyber Security said yesterday.
Last year, Chinese hackers mounted 288 successful cyberattacks on the government’s systems, or 80 percent of the total of 360 successful attacks that the department discovered, department Director Chien Hung-wei (簡宏偉) said.
Each month, the government’s systems are subjected to anywhere between 20 million and 40 million attacks, in addition to billions of probing actions made by hackers looking for weaknesses, he said.
Photo: courtesy of Military News Agency
These actions are initiated by hackers from around the world, though groups based in China are believed to be involved in many of them, Chien said.
The overwhelming majority of cyberattacks are level 1 or level 2 events that result in unauthorized changes to Web pages or other minor damage, he said.
However, the government’s digital domains suffered 10 level 3 incidents, which might have compromised personal data stored on the affected systems, he said.
While there were no successful level 4 attacks — the highest threat level — against the nation’s infrastructure, Chinese hackers had improved the success rate of their attacks, he said.
“The increasing precision of Chinese attacks is a matter of concern for this department,” Chien said.
Hackers route their attacks through servers in the US, Russia, EU member states and other nations, which makes pinpointing an attack’s point of origin difficult, he said.
However, the department is able to identify specific patterns, traits and other modes of operation that are associated with China-sponsored hackers, including the presence of certain characters or styles of coding used in hacking tools, he said.
Hackers from China, North Korea and Russia have been highly active, and Taiwan often serves as a testing ground for new hack tools or techniques before their deployment against targets in other nations, he said.
As a result, foreign governments have expressed an interest in gaining access to the information the department has collected on cyberattacks directed against Taiwan, he said.
The department is overseeing the government’s efforts to develop a system of defense to shield its core computer systems, infrastructure and sensitive data from cyberattacks, Chien said.
The defensive system would involve building up defenses at each of the government’s Web portals and each of the office domains connected to them, he said.
Furthermore, government offices need to communicate with each other and share information about cyberattacks to coordinate their security efforts and discern emerging threats, he said.
An academic, on the day of being nominated a Cabinet official, had received an e-mail with an embedded virus that was designed to penetrate the government’s internal networks, said an official, who asked not to be named.
A Chinese aircraft carrier group entered Japan’s economic waters over the weekend, before exiting to conduct drills involving fighter jets, the Japanese Ministry of Defense said yesterday. The Liaoning aircraft carrier, two missile destroyers and one fast combat supply ship sailed about 300km southwest of Japan’s easternmost island of Minamitori on Saturday, a ministry statement said. It was the first time a Chinese aircraft carrier had entered that part of Japan’s exclusive economic zone (EEZ), a ministry spokesman said. “We think the Chinese military is trying to improve its operational capability and ability to conduct operations in distant areas,” the spokesman said. China’s growing
Taiwan yesterday denied Chinese allegations that its military was behind a cyberattack on a technology company in Guangzhou, after city authorities issued warrants for 20 suspects. The Guangzhou Municipal Public Security Bureau earlier yesterday issued warrants for 20 people it identified as members of the Information, Communications and Electronic Force Command (ICEFCOM). The bureau alleged they were behind a May 20 cyberattack targeting the backend system of a self-service facility at the company. “ICEFCOM, under Taiwan’s ruling Democratic Progressive Party, directed the illegal attack,” the warrant says. The bureau placed a bounty of 10,000 yuan (US$1,392) on each of the 20 people named in
Nine retired generals from Taiwan, Japan and the US have been invited to participate in a tabletop exercise hosted by the Taipei School of Economics and Political Science Foundation tomorrow and Wednesday that simulates a potential Chinese invasion of Taiwan in 2030, the foundation said yesterday. The five retired Taiwanese generals would include retired admiral Lee Hsi-min (李喜明), joined by retired US Navy admiral Michael Mullen and former chief of staff of the Japan Self-Defense Forces general Shigeru Iwasaki, it said. The simulation aims to offer strategic insights into regional security and peace in the Taiwan Strait, it added. Foundation chair Huang Huang-hsiung
PUBLIC WARNING: The two students had been tricked into going to Hong Kong for a ‘high-paying’ job, which sent them to a scam center in Cambodia Police warned the public not to trust job advertisements touting high pay abroad following the return of two college students over the weekend who had been trafficked and forced to work at a cyberscam center in Cambodia. The two victims, surnamed Lee (李), 18, and Lin (林), 19, were interviewed by police after landing in Taiwan on Saturday. Taichung’s Chingshui Police Precinct said in a statement yesterday that the two students are good friends, and Lin had suspended her studies after seeing the ad promising good pay to work in Hong Kong. Lee’s grandfather on Thursday reported to police that Lee had sent