Taiwan Hit by Record 2.63M Daily Chinese Cyber Attacks in 2025

Taiwan’s National Security Bureau (NSB) released a sobering report on January 4, revealing that Chinese-linked cyberattacks targeting the island’s critical infrastructure averaged 2.63 million per day throughout 2025—a 6% increase from 2024 and a staggering 113% jump since tracking began in 2023.

These state-sponsored operations, often synchronized with PLA military drills, represent a deliberate “hybrid warfare” strategy aimed at disrupting or paralyzing key sectors like energy, healthcare, and semiconductors.

Key Findings from the NSB Report

  • Daily Attack Volume: 2.63 million intrusion attempts on average, up 6% YoY.
  • Sharpest Increases: Energy, emergency rescue, and hospital sectors saw the most dramatic spikes.
  • Hybrid Timing: Cyber surges coincided with 23 of China’s 40 “joint combat readiness patrols” in 2025.
  • Peak Activity: Highest incidents around May 20 (anniversary of Taiwan President Lai Ching-te’s inauguration).
  • Tech Theft Focus: Intensive targeting of science parks and semiconductor supply chains to bolster China’s self-reliance amid U.S.-China tech rivalry.

Primary Attack Tactics Employed

Chinese threat actors relied on four core methods in 2025:

  • Vulnerability Weaponization (over 50% of incidents): Exploiting hardware/software flaws in network equipment and industrial control systems.
  • DDoS Attacks (21%): Botnet-driven floods to overwhelm services and disrupt daily life.
  • Social Engineering (18%): Phishing emails posing as trusted contacts to deliver malware.
  • Supply Chain Compromises: Infiltrating subcontractors and providers for deeper access.

Notable groups included BlackTech, Flax Typhoon, Mustang Panda, APT41, and UNC3886, focusing on energy, healthcare, communications, government, and high-tech sectors.

Ransomware hit hospitals hard—at least 20 major deployments identified, with stolen data sold on dark web forums.

Broader Implications for Global Defenders

This escalation underscores China’s integration of cyber operations into geopolitical coercion:

  • Critical Infrastructure Vulnerability: Attacks on energy (10x increase in some probes) and telecoms risk real-world disruption, from power outages to comms blackouts.
  • Semiconductor Supply Chain Risks: Theft from Taiwan’s science parks (home to TSMC and others) accelerates China’s tech ambitions, potentially shifting global chip dynamics.
  • Hybrid Warfare Blueprint: Syncing cyber with military drills previews tactics that could extend to allies or contested regions.
  • Global Echoes: Indo-Pacific, NATO, and EU agencies repeatedly flagged China as the top cyber threat source in 2025.

As tensions rise into 2026, expect continued—or intensified—gray-zone aggression.

Recommendations for Organizations

To counter similar state-level threats:

  • Patch Aggressively: Prioritize vulnerabilities in edge devices, ICS, and telecom gear.
  • Segment Networks: Implement zero-trust and air-gapped backups for critical systems.
  • Enhance Monitoring: Deploy advanced threat hunting for APT persistence and supply-chain anomalies.
  • Employee Training: Simulate social engineering with focus on phishing from “trusted” sources.
  • International Collaboration: Share IOCs via alliances (e.g., with NSB partners or Five Eyes) for faster attribution and response.
  • Ransomware Prep: Regular offline backups and incident response drills tailored to healthcare/energy.

Taiwan’s resilience—bolstered by joint defenses and international intel sharing—offers a model, but no sector is immune.

This NSB disclosure is a wake-up call: state-sponsored cyber armies are scaling up, and 2026 could bring even more sophisticated hybrid campaigns.

“On average, China’s cyber army launched 2.63 million intrusion attempts per day targeting Taiwan’s critical infrastructure (CI) across nine key sectors.” Taiwan National Security Bureau, 2025 Report

Source and full details:

Taiwan NSB Official Report (PDF)

CISA STATUS 1505 ACTIVE EXPLOITS
● VIEW RECENT THREATS
Latest (10) KEVs
CVE-2021-39935 Added: Feb 03, 2026
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
CVE-2025-64328 Added: Feb 03, 2026
Sangoma FreePBX OS Command Injection Vulnerability
CVE-2019-19006 Added: Feb 03, 2026
Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-40551 Added: Feb 03, 2026
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2026-1281 Added: Jan 29, 2026
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
CVE-2026-24858 Added: Jan 27, 2026
Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2018-14634 Added: Jan 26, 2026
Linux Kernel Integer Overflow Vulnerability
CVE-2025-52691 Added: Jan 26, 2026
SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability
CVE-2026-23760 Added: Jan 26, 2026
SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2026-24061 Added: Jan 26, 2026
GNU InetUtils Argument Injection Vulnerability
THREAT #1 CVE-2024-27198 94.58% SCORE
● VIEW DETAILED TOP 10
Global Intelligence
RANK #1 CVE-2024-27198 Score: 94.58% JetBrains TeamCity Authentication Bypass Vulnerability
RANK #2 CVE-2023-23752 Score: 94.52% Joomla! Improper Access Control Vulnerability
RANK #3 CVE-2017-1000353 Score: 94.51% Jenkins Remote Code Execution Vulnerability
RANK #4 CVE-2017-8917 Score: 94.50%
Known Security Vulnerability
RANK #5 CVE-2016-10033 Score: 94.49% PHPMailer Command Injection Vulnerability
RANK #6 CVE-2018-7600 Score: 94.49% Drupal Core Remote Code Execution Vulnerability
RANK #10 CVE-2018-13379 Score: 94.48% Fortinet FortiOS SSL VPN Path Traversal Vulnerability
GLOBAL THREAT GREEN Condition Level
VIEW THREAT REPORT
Threat Intelligence
Source: SANS ISC Report ↗ The InfoCon is a status system used by the SANS Internet Storm Center to track global internet threat levels.

Taiwan Hit by Record 2.63M Daily Chinese Cyber Attacks in 2025

Taiwan’s National Security Bureau (NSB) released a sobering report on January 4, revealing that Chinese-linked cyberattacks targeting the island’s critical infrastructure averaged 2.63 million per day throughout 2025—a 6% increase from 2024 and a staggering 113% jump since tracking began in 2023.

These state-sponsored operations, often synchronized with PLA military drills, represent a deliberate “hybrid warfare” strategy aimed at disrupting or paralyzing key sectors like energy, healthcare, and semiconductors.

Key Findings from the NSB Report

  • Daily Attack Volume: 2.63 million intrusion attempts on average, up 6% YoY.
  • Sharpest Increases: Energy, emergency rescue, and hospital sectors saw the most dramatic spikes.
  • Hybrid Timing: Cyber surges coincided with 23 of China’s 40 “joint combat readiness patrols” in 2025.
  • Peak Activity: Highest incidents around May 20 (anniversary of Taiwan President Lai Ching-te’s inauguration).
  • Tech Theft Focus: Intensive targeting of science parks and semiconductor supply chains to bolster China’s self-reliance amid U.S.-China tech rivalry.

Primary Attack Tactics Employed

Chinese threat actors relied on four core methods in 2025:

  • Vulnerability Weaponization (over 50% of incidents): Exploiting hardware/software flaws in network equipment and industrial control systems.
  • DDoS Attacks (21%): Botnet-driven floods to overwhelm services and disrupt daily life.
  • Social Engineering (18%): Phishing emails posing as trusted contacts to deliver malware.
  • Supply Chain Compromises: Infiltrating subcontractors and providers for deeper access.

Notable groups included BlackTech, Flax Typhoon, Mustang Panda, APT41, and UNC3886, focusing on energy, healthcare, communications, government, and high-tech sectors.

Ransomware hit hospitals hard—at least 20 major deployments identified, with stolen data sold on dark web forums.

Broader Implications for Global Defenders

This escalation underscores China’s integration of cyber operations into geopolitical coercion:

  • Critical Infrastructure Vulnerability: Attacks on energy (10x increase in some probes) and telecoms risk real-world disruption, from power outages to comms blackouts.
  • Semiconductor Supply Chain Risks: Theft from Taiwan’s science parks (home to TSMC and others) accelerates China’s tech ambitions, potentially shifting global chip dynamics.
  • Hybrid Warfare Blueprint: Syncing cyber with military drills previews tactics that could extend to allies or contested regions.
  • Global Echoes: Indo-Pacific, NATO, and EU agencies repeatedly flagged China as the top cyber threat source in 2025.

As tensions rise into 2026, expect continued—or intensified—gray-zone aggression.

Recommendations for Organizations

To counter similar state-level threats:

  • Patch Aggressively: Prioritize vulnerabilities in edge devices, ICS, and telecom gear.
  • Segment Networks: Implement zero-trust and air-gapped backups for critical systems.
  • Enhance Monitoring: Deploy advanced threat hunting for APT persistence and supply-chain anomalies.
  • Employee Training: Simulate social engineering with focus on phishing from “trusted” sources.
  • International Collaboration: Share IOCs via alliances (e.g., with NSB partners or Five Eyes) for faster attribution and response.
  • Ransomware Prep: Regular offline backups and incident response drills tailored to healthcare/energy.

Taiwan’s resilience—bolstered by joint defenses and international intel sharing—offers a model, but no sector is immune.

This NSB disclosure is a wake-up call: state-sponsored cyber armies are scaling up, and 2026 could bring even more sophisticated hybrid campaigns.

“On average, China’s cyber army launched 2.63 million intrusion attempts per day targeting Taiwan’s critical infrastructure (CI) across nine key sectors.” Taiwan National Security Bureau, 2025 Report

Source and full details:

Taiwan NSB Official Report (PDF)

Follow us on
© 2026 ByteVanguard • Independent Cyber Threat Intelligence