Taiwan is facing a stepped up campaign of state-linked cyber activity that, by mid-2024, shows clear signs of both scale and intent. Threat intelligence firms and private sector reporting point to coordinated reconnaissance and intrusion operations that emphasize long-term access and strategic pre-positioning rather than one-off data theft. These campaigns have focused heavily on government networks and organizations tied to information flow, including telecommunications providers.
What we are seeing, in technical terms, is a mix of two trajectories. One cluster of activity - tracked by several vendors under names such as RedJuliett, Flax Typhoon, and Ethereal Panda - has been scanning and exploiting internet-facing appliances and public-facing applications to gain footholds in Taiwanese government, academic, and tech organizations. The Recorded Future Insikt Group documented extensive vulnerability scanning and attempted exploitation across more than 70 Taiwanese organizations between late 2023 and spring 2024, and it linked administration activity to Fuzhou, Fujian province.
A separate but related pattern was highlighted in government and private advisories earlier in 2023. The actor known as Volt Typhoon was observed exploiting and leveraging compromised small office and home office edge devices - routers, firewalls, and VPN appliances - to camouflage command and control traffic and maintain persistent access in critical infrastructure environments. That approach makes attribution and detection harder because malicious traffic is tunneled through otherwise benign consumer-grade devices and because the intruders rely on living-off-the-land techniques that avoid noisy malware signatures.
Telecommunications are a logical, high-value target in this environment. Compromising carriers and their suppliers can yield subscriber metadata, routing and peering information, and privileged operational access to core network functions. Those capabilities support both espionage and the potential to degrade communications at scale during a crisis. The practical evidence that telecoms in Taiwan have been affected includes reporting of a large data leak tied to Chunghwa Telecom in early 2024, in which internal documents and government-related contracts were advertised for sale. That incident underscores how breaches in the telecom sector can surface sensitive government-related material and create second-order risks for national security.
Taken together, the intelligence picture through August 2024 suggests a deliberate emphasis on: initial access via exposed internet-facing appliances; stealthy persistence using native OS tools and legitimate software such as SoftEther for covert tunneling; and selective targeting across government, critical manufacturing, research and telecom ecosystems. Microsoft and other industry researchers have documented the low-footprint tradecraft and the use of benign administration utilities to avoid detection.
Why the surge matters beyond headline counts - and why defenders should care - is twofold. First, repeated scanning and exploitation of edge infrastructure builds a distributed set of access points that an adversary can later use to route or amplify disruptive operations. Second, success against telecom suppliers and service providers amplifies downstream exposure across government and private customers, increasing both espionage yield and the chance of kinetic-scale disruption during crises. The Volt Typhoon analysis in particular warned that pre-positioning inside communications networks could be used to complicate mobilization or crisis response.
Detection and mitigation are technically straightforward in concept but operationally hard in practice. Key priorities for Taiwanese networks and their partners include: replacing or isolating end-of-life edge devices; accelerating patch management for public-facing appliances; enforcing least privilege and multi-factor authentication for administrative accounts; deploying layered monitoring tuned to living-off-the-land behaviors; and segmenting operational networks so that telecom management planes and subscriber-facing systems cannot be trivially used as pivot points into government or industrial networks. Public sector guidance and joint advisories also stress coordinated takedown and disruption of malicious infrastructure where legal authorities permit.
Practical steps for telecom operators and government IT teams
- Inventory and harden edge devices: identify routers, firewalls, VPN appliances and third-party kit that are unsupported or misconfigured, and prioritize replacement or network isolation. Evidence from prior campaigns shows these devices are prime initial access vectors.
- Hunt for living-off-the-land behaviors: instrument endpoints and servers to flag unusual use of native admin tools, unexpected scheduled tasks, or persistent tunnels that piggyback on legitimate services. Microsoft and other vendors have documented actors favoring this low-noise approach.
- Zero trust segmentation: move sensitive government and operational workloads behind strict identity and device posture checks so that a breach at the carrier layer cannot be used to escalate into government systems. Gradual adoption is better than none.
- Public-private sharing and rapid incident response: telecoms must coordinate with national CERTs, law enforcement and international partners to trace and remove malicious infrastructure and to harden common suppliers. Joint advisories and disruption actions have proven effective in past operations.
A cautionary closing note for defenders: adversaries focused on Taiwan are iterating quickly. Campaigns observed in 2023 and into 2024 show that state-aligned groups are combining classic espionage goals with operational concepts designed to enable future disruption. That means defenders should treat even apparently low-impact intrusions as potential pre-positioning rather than one-off thefts. The technical response therefore must be both surgical - hunting and cleaning current compromises - and strategic - replacing fragile single points of failure in the communications supply chain and embedding resilience in how government and critical services interconnect.