Written by Ferhat Dikbiyik
Additional Contributors Yavuz Han, Ekrem Celik and Gizem Toprak
Edited by Haley Williams

Due to increasing tension between China and Taiwan after Speaker of the United States House of Representatives Nancy Pelosi’s visit, we have observed many cyber attacks between the two countries. Vendors in these countries or vendors with an IT asset in either of these countries pose an increased cyber risk within the supply chain. As a result, our customers have requested FocusTags™ dedicated to the China-Taiwan conflict.

Black Kite’s FocusTags™ are a fast and simple way for platform users to track high-profile cyber events and quickly identify which vendors have been affected within their supply chain. This capability furthers the company’s mission to provide continuous monitoring of vendors to identify and mitigate ransomware and other risks. FocusTags™ are automatically applied following high-profile cyber attacks or ongoing conflicts, but can also be added to help organize vendors in the Black Kite platform.

With this increased risk and continued tension, it is more important than ever to have a constant eye on the supply chain, monitoring any changes or increases in risk due to disclosed attacks.

The Black Kite Research team curated a list of cyber events surrounding the conflict and created a detailed timeline that can be found at the end of this article.

Cybersecurity Posture of Taiwanese Vendors

There are 250 Taiwanese companies currently being monitored by Black Kite customers. Black Kite Research also analyzed overall cybersecurity posture and Ransomware Susceptibility Index (RSI™) values for these companies. The list of Taiwanese companies are mostly chip and electronics manufacturers.

Within the 250 companies analyzed, three top vulnerabilities emerged. 64.8% of organizations currently support old SSL/TLS versions with weak cyber suites. SSL/TLS and SSH prevents intruders from tampering with communication, as well as eavesdropping on the communication that passes between the server and the user. This is especially important when sensitive data, i.e. personal information, like user credentials and payment details, are disseminated.

50.4% hold possible critical vulnerabilities due to out-of-date systems. Out-of-date systems are an obvious, but often overlooked issue, that facilitate access points for hackers to exploit. Finally, 44.4% have at least one credential leaked in the last 90 days. Once a credential is secured, leaking it on the deep web is a second step that can lead to a domino effect of risk, giving access to not only the original cyber criminal, but anyone who can find the credential.

It is also worth noting that 32% of organizations have poor email configuration, opening them up to more spoofing and phishing opportunities. A poorly-configured email service may allow an email to be delivered without authentication, appearing like it’s coming from a legitimate source. As it is the most common form of business communication, email security is critical to protect against potential breaches.

Cybersecurity Posture of Taiwanese Vendors

Ransomware Susceptibility

In high tension situations such as the China and Taiwan conflict, ransomware attacks become even more common toward third-parties associated with the regions in conflict. Additionally, multiple ransomware attacks towards the same company are not uncommon, particularly in situations where critical issues aren’t known or haven’t fully been resolved.

Cybercriminals target organizations that do not consistently deploy due diligence or make cybersecurity a priority within the business. Cybercriminals anticipate that security issues and vulnerabilities will remain present and exploitable if the cybersecurity investment is not adequate.

Black Kite is the only cyber ratings platform that can identify ransomware susceptibility for a

company in advance of an attack. Using data and machine learning, Black Kite’s RSI™ discovers the likelihood that an organization will experience a ransomware attack, following a process of inspecting, transforming, and modeling collected from 400+ OSINT sources (internet wide scanners, hacker forums, the deep/dark web and more).

Black Kite also utilizes data analysis techniques, the cumulative cybersecurity expertise from internal sources, specific risk factors (regional, industry-based, and organizational), and the effects of common ransomware attack vectors, including the company’s country, industry, and annual revenue.

For the 250 organizations analyzed, the average RSI™ was 0.46:

  • 29% had an RSI™ at or above the critical threshold of 0.6, indicating high susceptibility to a ransomware attack
  • 50% had an RSI™ higher than 0.4, indicating significant susceptibility to attack
RSI range graph

How to determine vendors that might be affected by the China-Taiwan conflict

Ongoing cybersecurity weaknesses in the supply chain further the need for continuous monitoring of high-risk vulnerabilities. Black Kite’s platform has the power to provide visibility into the cyber architecture of the supply chain and address issues that must be resolved to ensure resiliency.

More often than not, cybercriminals target your third party vendors, allowing for easier access to your internal systems and sensitive data. This includes all vendors, partners, and other third-parties, not just tier-1 or so-called ‘critical vendors’. That is why it’s imperative to monitor your entire supply chain and ensure you conduct adequate due diligence before contracting with new vendors.

As mentioned above, we added new FocusTags™ dedicated to the China-Taiwan conflict. Similar to our geopolitical tags for the Russia/Ukraine conflict, there are six tags that have been auto-applied to affected organizations:

  • China – Location identified
  • Taiwan – Location identified
  • China – IT asset identified
  • Taiwan – IT asset identified
  • China – 4th party location identified
  • Taiwan – 4th party location  identified

This tag will be used if a company’s country is China/Taiwan. These are critical-risk vendors.

example corp located in taiwan

This tag should be used if a company’s IT asset is in China/Taiwan. These are high-risk vendors.

example corp has asset in china

This tag should be used if a vendor’s vendor is located in China/Taiwan. These are medium-risk vendors.

Reminder: Vendors in or vendors with an IT asset in either of these countries pose increased cyber risk within your supply chain.

Since not all vendors will be affected, you can use the platform’s filtering functionality to narrow down which vendors have been tagged:

  • Go to Ecosystems > Company List, and click on Filter
  • Select the ‘Tags’ field in the pop up window
  • Select any or all of the 6 China/Taiwan tags
  • Click ‘Filter’

Timeline of significant cyber incidents

DateTargetCountryThreat ActorIncident
2022-01-04Heilongjiang Society Scientific Community FederationChinaAnonymousMembers of the decentralized hacktivist group Anonymous hacked into China’s Heilongjiang Society Scientific Community Federation website
2022-01-14Polar Research Institute of ChinaChinaAnonymousMembers of the decentralized hacktivist group Anonymous hacked into www.polar.org.cn, a Chinese government website affiliated with the Polar Research Institute
2022-02-22Taiwan’s financial sectorTaiwanAPT10An advanced persistent threat (APT) group operating with objectives aligned with the Chinese government has been linked to an organized supply chain attack on Taiwan’s financial sector.
2022-05-07Chengdu Chinese Communist PartyChinaAnonymousHacker group Anonymous, which is primarily known for its cyberattacks, has warned China not to do anything ”stupid” against Taiwan.
2022-08-02Taiwanese government websitesTaiwanUnknownDigital attacks against Taiwanese government websites ahead of U.S. House of Representatives Speaker Nancy Pelosi’s arrival in Taipei
2022-08-02The official website of the Presidential PalaceTaiwanUnknownTaiwan Presidential Palace spokesperson Chang Tun-Han acknowledged this and said in a Facebook post that the official website of the Presidential Palace was attacked by an overseas DDoS attack, and the attack traffic was 200 times that of normal traffic.
2022-08-03Taiwanese government and infrastructure systemsTaiwanAPT 27APT27 announced a “special cyber operation” on the Taiwanese government and infrastructure
2022-08-037-ElevenTaiwanUnknownSome 7-Eleven convenience stores were cyber attack
2022-08-03Taiwan Railways AdministrationTaiwanUnknownCyber ​​attack on Taiwan Railways Administration
2022-08-03Taiwan government portal, Taiwan’s foreign ministry websiteTaiwanUnknownCyber ​​attack on Taiwan government portal and Taiwan’s foreign ministry website
2022-08-03UnknownTaiwanAPT 27APT group 27 Attack claimed it had shut down 60,000 internet-connected devices in Taiwan
2022-08-06– Taiwan Power Research Institute (source code leak)
– The General Administration of Highways of the Ministry of Transportation
– The Police Administration of Taiwan’s Ministry of Interior
– The Presidential Office
– Jinzhiyang Technology Co. Ltd (alleged)
– Shennao International Co. Ltd (alleged)
– Financial Information Service Co. Ltd (source code leak)
– They stated that they could attack 200,000 devices connected to Taiwan
TaiwanAPT 27APT27 announced a new video on on August 6, 2022. They claimed that has successfully targeted the Taiwanese institutions
2022-08-07National Taiwan UniversityTaiwanUnknownNational Taiwan University hacked
2022-08-10Formosa Television (FTV)TaiwanUnknownFormosa Television (FTV) reported an intensive series of cyberattacks while China’s People’s Liberation Army conducted live-fire military exercises
2022-08-08Taiwanese governmentTaiwanUnknownCyber attacks and a Chinese disinformation campaign targeting the democratic island of Taiwan throw the spotlight on Beijing’s use of hybrid warfare in the wake of Pelosi’s visit
2022-08-12Taiwan Turns to Ethereum IPFS Tech to Thwart Chinese Cyberattacks
2022-08-18Group-IB published a new report about APT41. The group’s targets include government and private organizations based in the US, Taiwan, India, Thailand, China, Hong Kong, Mongolia, Indonesia, Vietnam, Bangladesh, Ireland, Brunei, and the UK.
taiwan numbah wan

Ransomware Incidents and Data Breaches Experienced by Taiwanese and Chinese Companies

Black Kite Research also discovered several ransomware attacks experienced by Taiwanese and Chinese companies. There is no solid evidence that these attacks were due to the recent conflict escalation, but they are notable attacks that should be recorded.

Ransomware Incidents

CompanyCountryIndustryDate of disclosureThreat Actor
Etron Technology Inc.TaiwanManufacturing2022-06-01Cuba
QNAP SystemsTaiwanIT Services and IT Consulting2022-06-18ech0raix
Shenzhen Institute of Building ResearchChinaConstruction Services2022-06-21Lockbit 2.0
LinmarkChinaWholesale2022-06-22Lockbit 2.0
SuperAlloy Industrial Co. Ltd.TaiwanManufacturing2022-06-28Hive
Sin Sheng Terminal and Machine IncTaiwanManufacturing2022-07-07Cuba
Shanghai Hanbell Precise MachineryChinaManufacturing2022-07-11Karakurt
CpicfiberChinaManufacturing2022-07-19Locbit 3.0
Yong Mao Environmental Tech. Co.,LtdTaiwanManufacturing2022-07-23Locbit 3.0
YMA Corporation Carbon Fiber & CompositesChinaManufacturing2022-07-26Locbit 3.0
ENN GroupChinaUtilities2022-08-04Hive
Fosun InternationalChinaMultiple industry2022-08-09Locbit 3.0
Torin DriveChinaManufacturing2022-08-29BlackByte

Data Leaks

DateInformation
2022-05-27Data leak about Taiwan top companies email databases (110K)
2022-06-24China loan information Database leak (80K records)
2022-07-03Phone numbers and names data leak about Taiwan (100K)
2022-07-10Data leak on Taiwan’s military leaders (783 lines)
2022-07-17China Passport Database – Hades Data Leak
2022-08-12Data leak on ZTE Corporation -China- (by AgainstTheWest)

Get A Free Vendor Risk Assessment Today

Black Kite offers a free vendor assessment here. Act now and request your free vendor assessment to see the possible impacts of the China Taiwan tension in cyberspace on your supply chain.

Risk Assessment
References