Information Security 4 min read

How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm

Guangzhou police investigated a foreign cyber‑attack on a local tech firm, traced the malicious code to a Taiwan‑based hacker group linked to the DPP, and detailed the group’s low‑level tactics, extensive asset scanning, and use of VPNs and overseas cloud servers.

Efficient Ops
Efficient Ops
Efficient Ops
How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm

Earlier, the Tianhe District Public Security Bureau in Guangzhou announced that a local technology company had been attacked by an overseas hacker organization. Police promptly launched an investigation, extracted the malicious program samples, secured related evidence, and assembled a technical team for traceability.

According to the police, the incident was taken seriously, and the technical team analyzed the extracted attack program and system logs. Preliminary findings indicate the attack was carried out by a hacker group nurtured by the Taiwanese Democratic Progressive Party authorities.

The investigation revealed that the Taiwanese hacker group has recently used public network asset scanning platforms to probe over a thousand critical systems across more than ten mainland provinces, covering sectors such as military, energy, water, transportation, and government. They collected basic system information and technical intelligence, and conducted multiple rounds of attacks using phishing emails, public vulnerability exploits, brute‑force password cracking, and simple homemade trojans.

Technical experts note that the group’s overall technical level is relatively low, employing crude attack methods and leaving many traceable clues. Their self‑made trojan programs are poorly coded, providing valuable forensic evidence for identifying the perpetrators and their locations. Although the attackers often use VPNs, overseas cloud hosts, and proxy machines with IP addresses from the United States, France, South Korea, Japan, the Netherlands, Israel, Poland, etc., investigators were able to trace the full attack chain and uncover the true intent.

Information Securitycybersecuritynetwork attackhacker attributionTaiwan hacker group
Efficient Ops
Written by

Efficient Ops

This public account is maintained by Xiaotianguo and friends, regularly publishing widely-read original technical articles. We focus on operations transformation and accompany you throughout your operations career, growing together happily.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.