Chinese hackers, likely state-sponsored, have been broadly targeting government and private-sector organizations across Southeast Asia, including those closely involved with Beijing on infrastructure development projects, a report released on Wednesday by a US-based private cybersecurity company said.
Specific targets included the Thai prime minister’s office and the Thai army, the Indonesian and Philippine navies, Vietnam’s National Assembly and the central office of its Communist Party, and Malaysia’s Ministry of Defense, said Insikt Group, the threat research division of Massachusetts-based Recorded Future.
Insikt said it determined that the high-profile military and government organizations in Southeast Asia had been compromised over the past nine months by hackers using custom malware families such as FunnyDream and Chinoxy.
Those custom tools are not publicly available and are used by multiple groups believed to be sponsored by China, the group said.
The targeting also aligns with the political and economic goals of the Chinese government, bolstering the suspicion it is state-sponsored, Insikt said.
“We believe this activity is highly likely to be a state actor, as the observed long-term targeted intrusions into high-value government and political targets is consistent with cyberespionage activity, coupled with identified technical links to known Chinese state-sponsored activity,” it said.
The Chinese Ministry of Foreign Affairs did not immediately respond to a request for comment on the allegations.
In the past, Chinese authorities have consistently denied any form of state-sponsored hacking, instead saying that China itself is a major target of cyberattacks.
Of the cyberintrusions it tracked, Insikt Group said Malaysia, Indonesia and Vietnam were the top three targeted countries. Also targeted were Myanmar, the Philippines, Laos, Thailand, Singapore and Cambodia.
All countries were notified in October of the findings, although it is thought that at least some of the activity is ongoing, the company said.
“Throughout 2021, Insikt Group tracked a persistent cyberespionage campaign targeting the prime minister’s offices, military entities, and government departments of rival South China Sea claimants Vietnam, Malaysia and the Philippines,” the company said. “Additional victims during the same period include organizations in Indonesia and Thailand.”
Much of that campaign was attributed to a group being tracked under the temporary identifier Threat Activity Group 16, or TAG-16, Insikt Group said.
“We also identified evidence suggesting that TAG-16 shares custom capabilities with the [Chinese] People’s Liberation Army-linked activity group RedFoxtrot,” the group said.
Overall, Insikt Group said it had identified more than 400 unique servers in Southeast Asia communicating with malware, but it was not clear what information had been compromised.
UPDATED (3:40pm): A suspected gas explosion at a shopping mall in Taichung this morning has killed four people and injured 20 others, as emergency responders continue to investigate. The explosion occurred on the 12th floor of the Shin Kong Mitsukoshi in Situn District (西屯) at 11:33am. One person was declared dead at the scene, while three people were declared deceased later after receiving emergency treatment. Another 20 people sustained major or minor injuries. The Taichung Fire Bureau said it received a report of the explosion at 11:33am and sent rescuers to respond. The cause of the explosion is still under investigation, it said. The National Fire
ACCOUNTABILITY: The incident, which occured at a Shin Kong Mitsukoshi Department Store in Taichung, was allegedly caused by a gas explosion on the 12th floor Shin Kong Group (新光集團) president Richard Wu (吳昕陽) yesterday said the company would take responsibility for an apparent gas explosion that resulted in four deaths and 26 injuries at Shin Kong Mitsukoshi Zhonggang Store in Taichung yesterday. The Taichung Fire Bureau at 11:33am yesterday received a report saying that people were injured after an explosion at the department store on Section 3 of Taiwan Boulevard in Taichung’s Situn District (西屯). It sent 56 ambulances and 136 paramedics to the site, with the people injured sent to Cheng Ching Hospital’s Chung Kang Branch, Wuri Lin Shin Hospital, Taichung Veterans General Hospital or Chung
‘TAIWAN-FRIENDLY’: The last time the Web site fact sheet removed the lines on the US not supporting Taiwanese independence was during the Biden administration in 2022 The US Department of State has removed a statement on its Web site that it does not support Taiwanese independence, among changes that the Taiwanese government praised yesterday as supporting Taiwan. The Taiwan-US relations fact sheet, produced by the department’s Bureau of East Asian and Pacific Affairs, previously stated that the US opposes “any unilateral changes to the status quo from either side; we do not support Taiwan independence; and we expect cross-strait differences to be resolved by peaceful means.” In the updated version published on Thursday, the line stating that the US does not support Taiwanese independence had been removed. The updated
‘LAWFUL USE’: The last time a US warship transited the Taiwan Strait was on Oct. 20 last year, and this week’s transit is the first of US President Donald Trump’s second term Two US military vessels transited the Taiwan Strait from Sunday through early yesterday, the Ministry of National Defense said in a statement, the first such mission since US President Donald Trump took office last month. The two vessels sailed south through the Strait, the ministry said, adding that it closely monitored nearby airspace and waters at the time and observed nothing unusual. The ministry did not name the two vessels, but the US Navy identified them as the Arleigh Burke-class guided-missile destroyer USS Ralph Johnson and the Pathfinder-class survey ship USNS Bowditch. The ships carried out a north-to-south transit from