China-linked groups intensify attacks on Taiwan’s critical infrastructure, NSB warns

Security Affairs
Actively Exploited

Overview

Taiwan's National Security Bureau (NSB) has reported a significant increase in cyberattacks attributed to China, particularly targeting the island's energy sector. In 2025, these attacks surged tenfold, affecting critical infrastructure across nine different sectors. Overall, there was a 6% increase in cyber incidents compared to the previous year. This spike in activity indicates a growing threat to Taiwan's essential services and raises concerns about the security of its infrastructure. As tensions between Taiwan and China continue, the escalation of cyber warfare poses serious implications for national security and public safety.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Energy sector, critical infrastructure across nine sectors
  • Timeline: Ongoing since 2025

Original Article Summary

Taiwan says China-linked cyberattacks on its energy sector rose tenfold in 2025, hitting critical infrastructure across nine sectors, with total incidents up 6%. Taiwan reports China-linked cyberattacks on its energy sector surged tenfold in 2025, targeting critical infrastructure across nine sectors, with total incidents up 6% YoY. Taiwan’s National Security Bureau (NSB) reports China launched […]

Impact

Energy sector, critical infrastructure across nine sectors

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Ongoing since 2025

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Critical.

Related Coverage

How indirect prompt injection attacks on AI work - and 6 ways to shut them down

Latest news

Cybercriminals have discovered a method to manipulate artificial intelligence systems through indirect prompt injection attacks. This technique tricks AI into revealing sensitive information, executing harmful code, or redirecting users to malicious websites. Such attacks can potentially compromise personal data and security, affecting both individuals and organizations that rely on AI technologies. Researchers emphasize the need for robust security measures to protect against these tactics, as the implications for data privacy and system integrity are significant. Users and companies alike should be aware of these risks and implement strategies to mitigate them.

Apr 24, 2026

Vercel attack fallout expands to more customers and third-party systems

CyberScoop

Vercel has reported finding more signs of a security compromise affecting its customer base, raising concerns about potential risks to downstream systems. While the exact nature of the exposure remains unclear, the company is actively investigating the situation and working to assess the impact on its clients. This incident is significant because it may not only affect Vercel's direct customers but also third-party systems connected to them, amplifying the risk of broader security issues. Companies using Vercel's services should remain vigilant and monitor for any unusual activity as the investigation unfolds. The situation is still developing, and further updates are expected as Vercel continues to analyze the extent of the compromise.

Apr 23, 2026

China-Backed Hackers Are Industrializing Botnets

darkreading

Chinese state-sponsored hackers are increasingly using networks of compromised devices, known as botnets, to carry out cyberattacks. This approach allows them to conduct operations with minimal costs and risks, while maintaining plausible deniability. The use of botnets amplifies their capabilities, enabling them to launch large-scale attacks against various targets without the need for extensive resources. This trend poses significant risks to organizations worldwide, as it complicates detection and response efforts. Companies and users should be vigilant about securing their devices to prevent them from being hijacked for these malicious purposes.

Apr 23, 2026

Dragos: Despite AI use, new malware targeting water plants is ‘hype’

CyberScoop

A new piece of malware named ZionSiphon has emerged, reportedly aimed at disrupting water supplies in Israel. However, experts from Dragos, a cybersecurity firm specializing in operational technology, have assessed the malware as ineffective and likely the work of inexperienced individuals utilizing artificial intelligence. This raises questions about the actual capabilities of the malware and the seriousness of the threat it poses. Despite the sensational headlines, experts suggest that the hype surrounding ZionSiphon may outweigh its real-world impact. Understanding the limitations of such attacks is crucial for water facility operators, who must remain vigilant but not overly alarmed by exaggerated claims.

Apr 23, 2026

A dozen allied agencies say China is building covert hacker networks out of everyday routers

CyberScoop

A coalition of twelve allied agencies has issued a warning regarding a shift in tactics by Chinese hackers, who are reportedly using common routers to build covert hacking networks. These everyday devices, often overlooked in terms of security, can be exploited to gain unauthorized access to sensitive information. Organizations are advised to enhance their security measures by regularly updating router firmware, changing default passwords, and monitoring network traffic for unusual activity. This development is particularly concerning given the widespread use of consumer-grade routers, which could be leveraged to compromise a vast number of networks. The implications are significant, as this tactic could enable attackers to infiltrate both personal and corporate systems without detection.

Apr 23, 2026

Over $12M stolen in North Korean crypto heist against web developers

SCM feed for Latest

A North Korean hacking group known as HexagonalRodent has reportedly stolen up to $12 million in cryptocurrency from Web3 developers. This operation, linked to the state-backed group Famous Chollima, took place between January and March of this year. The attackers targeted individuals and organizations involved in Web3 technology, which includes decentralized applications and blockchain development. The stolen funds could be used to finance North Korea's activities, raising concerns about the implications for both the cryptocurrency industry and international security. As the threat from state-sponsored cybercrime continues to grow, developers in the tech space need to enhance their security measures to protect against such sophisticated attacks.

Apr 23, 2026