{"id":5587,"date":"2025-05-28T09:18:17","date_gmt":"2025-05-28T09:18:17","guid":{"rendered":"http:\/\/forefrontnews.cn\/?p=5587"},"modified":"2025-05-28T09:18:17","modified_gmt":"2025-05-28T09:18:17","slug":"taiwan-hackerbronze-player-current-notes","status":"publish","type":"post","link":"http:\/\/forefrontnews.cn\/?p=5587","title":{"rendered":"Taiwan hacker\u201cBronze player\u201d current notes"},"content":{"rendered":"<p>A smokeless\u201cBattle\u201d has been going on.<br \/>\nThe Tianhe District branch of the Guangzhou Public Security Bureau issued a&#8221;Police intelligence notice&#8221; on the 27th, saying that there had been important progress in the investigation of a cyber attack on a technology company by foreign hackers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5588 aligncenter\" title=\"640-26\" src=\"http:\/\/forefrontnews.cn\/wp-content\/uploads\/2025\/05\/640-26.jpeg\" alt=\"640-26\" width=\"464\" height=\"826\" srcset=\"http:\/\/forefrontnews.cn\/wp-content\/uploads\/2025\/05\/640-26.jpeg 464w, http:\/\/forefrontnews.cn\/wp-content\/uploads\/2025\/05\/640-26-169x300.jpeg 169w\" sizes=\"(max-width: 464px) 100vw, 464px\" \/><\/p>\n<p>Originally, Guangzhou Police have initially identified the company suffered from the cyberattacks are Taiwan&#8217;s Democratic Progressive Party (DPP-RRB- authorities funded by the hacker group.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5589 aligncenter\" title=\"640-24\" src=\"http:\/\/forefrontnews.cn\/wp-content\/uploads\/2025\/05\/640-24.jpeg\" alt=\"640-24\" width=\"768\" height=\"432\" srcset=\"http:\/\/forefrontnews.cn\/wp-content\/uploads\/2025\/05\/640-24.jpeg 768w, http:\/\/forefrontnews.cn\/wp-content\/uploads\/2025\/05\/640-24-300x169.jpeg 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/p>\n<p>Let&#8217;s run through the timeline.<br \/>\nOn May 20, a technology company in Guangzhou was attacked by hackers, and the Guangzhou Police quickly stepped in to investigate.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5591 aligncenter\" title=\"640-17\" src=\"http:\/\/forefrontnews.cn\/wp-content\/uploads\/2025\/05\/640-17.png\" alt=\"640-17\" width=\"496\" height=\"434\" srcset=\"http:\/\/forefrontnews.cn\/wp-content\/uploads\/2025\/05\/640-17.png 496w, http:\/\/forefrontnews.cn\/wp-content\/uploads\/2025\/05\/640-17-300x263.png 300w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/><\/p>\n<p>This attack is a large-scale organized and premeditated action by overseas hacker organizations, which has the trace of network warfare and can be done by non-ordinary individual hackers.<br \/>\nThe related network attack has the obvious political background, has the high directionality, belongs to the persistent threat activity, namely APT attack.<br \/>\nThe incident caused heavy losses to the Guangzhou Company, the company involved in self-service terminals covering 32 cities across the country, the system failure during the cumulative impact of more than 500,000 times the use of equipment.<br \/>\nMore worrying is that the background of the database of user identity information, device operation data and other sensitive content leakage risk.<br \/>\nDuring the emergency response, technicians found that the traces of the attack showed that the hacker had tried to establish a persistent access channel, showing professional militarization features from vulnerability exploitation to enhanced authority to trace removal.<br \/>\nPreliminary tracking found that the hacker organization long-term use of open source tools to scan detection of China&#8217;s important departments, Sensitive Industries and technology companies network assets.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5590 aligncenter\" title=\"640-27\" src=\"http:\/\/forefrontnews.cn\/wp-content\/uploads\/2025\/05\/640-27.jpeg\" alt=\"640-27\" width=\"573\" height=\"742\" srcset=\"http:\/\/forefrontnews.cn\/wp-content\/uploads\/2025\/05\/640-27.jpeg 573w, http:\/\/forefrontnews.cn\/wp-content\/uploads\/2025\/05\/640-27-232x300.jpeg 232w\" sizes=\"(max-width: 573px) 100vw, 573px\" \/><\/p>\n<p>Not only are guangzhou-based companies under attack, but they are also operating in more than a dozen provinces on the mainland, according to the Tianhe District branch of the city&#8217;s Public Security Bureau.<br \/>\nMilitary Industry, energy, hydropower, transportation, government and other important areas are targeted by them, involving more than 1,000 important network systems.<\/p>\n<p>If this really lets them succeed, that consequence simply can not imagine, just like to give our social order&#8221;Poked a big hole&#8221;.<br \/>\nSo how did they attack?<br \/>\nThey use the open network asset detection platform, specifically for the mainland&#8217;s important network system to carry out asset detection, like a thief in the street everywhere&#8221;Walk&#8221;.<br \/>\nThen the use of phishing e-mail, the use of public vulnerabilities, password violence, self-made simple trojan horse program these&#8221;Old&#8221; methods to carry out network attacks.<br \/>\nThey also frequently use VPN proxies, offshore cloud hosts, puppets, and multinational IP addresses ( , French, Korean, Japanese, etc.) as vests to hide their identity, thinking that they can get away with it.<br \/>\nBut technologists offer an analogy: \u201cIt&#8217;s like stealing with a ten-layer mask and your house number on your belt.\u201d<br \/>\nThis\u201cTechnical dishes but insisted on trouble\u201d operation, in front of the mainland police, is completely in the\u201cStreaking.<br \/>\nWhat eventually gave the hacker group away was that their Trojan program had obvious flaws. It was like a paper lantern that could easily be traced back to the source of the attack.<br \/>\nTo put it bluntly, these Trojan Horse program like elementary school students copy homework copy wrong answer, the police along the wrong questions directly found their nest.<br \/>\nThis hacker organization has been&#8221;Stirring up trouble&#8221; for a long time. In recent years, it has been continuously targeting mainland network system attacks. In particular, since last year, the frequency of attacks has increased by 300% , targets range from government websites to hydropower plant consoles. This mode of operation, and in the vegetable market, &#8220;Fake code real steal money&#8221; thief set almost, low-tech content, all rely on a wide net.<br \/>\nTheir favorite tactic, for example, is phishing e-mails with the headline&#8221;Your Account has an abnormal login&#8221; and a crude virus attached.<br \/>\nHowever, &#8220;Evil is better than evil&#8221;, the mainland&#8217;s countermeasures are more hard core, through the analysis of traffic characteristics, the establishment of&#8221;Attack Source Library&#8221;, not only to achieve more than 90% of the known attacks of the second-level interception, it can also lock down the physical address of a cyber attack in a very short time.<br \/>\nThere are two reasons for the&#8221;Taiwan independence&#8221; internet army to stir up trouble these two years: first, the DPP authorities are anxious to&#8221;Rely on the United States to seek independence&#8221; to gain a sense of existence, and second, their&#8221;Patron&#8221; the United States is behind the knife.<br \/>\nNow the most panic is probably the Taiwan to take on the dirty work of hackers. The mainland police are probably holding more lists than their hukou.<br \/>\nAnd the DPP authorities are still adamant, deleting posts and blaming&#8221;Mainland self-directed and self-staged&#8221;, just like the thieves caught on the spot, who still shout&#8221;I didn&#8217;t steal&#8221; even after taking the loot out of their pockets.<br \/>\nThe police notice&#8217;s reference to&#8221;Attacks with clear signs of cyber warfare&#8221; directly reveals that the DPP&#8217;s central aim in cyber warfare is to create chaos on the mainland through frequent attacks, paving the way for subsequent political manoeuvring.<br \/>\nAt present, cyberspace has become an important battlefield in the struggle against&#8221;Taiwan independence&#8221;.<br \/>\nFrom a technical point of view, this case highlights the mainland&#8217;s network security defense system efficiency and professionalism.<br \/>\nAlthough the Taiwan Hacker organization tried to confuse the public by means of multi-country IP hopping, its crude technical means and flawed Trojan horse program, it just exposes the essence of&#8221;Outside strong, middle dry&#8221; and&#8221;Inefficient attack&#8221;.<br \/>\nBy tracing the source accurately and locking the criminal chain, the mainland technical team not only reduces the dimension of the&#8221;Taiwan independence&#8221; cyber-army&#8217;s ability, but also punctures the false narrative of its&#8221;Technical deterrence&#8221; with the facts.<br \/>\nFrom a political point of view, the DPP authorities have long cultivated hacker groups and targeted cyber attacks on China&#8217;s critical infrastructure and People&#8217;s livelihood. This is no longer a simple technical crime, but a blatant act of splitting the country.<br \/>\nThe&#8221;Taiwan independence&#8221; cyber-army is just like the DPP authorities in spreading false information, creating cognitive confusion and disrupting social order in cyberspace, and is in serious violation of relevant laws, is a blatant trampling on the common interests of compatriots on both sides of the strait.<br \/>\nThe Mainland&#8217;s announcement of the progress of the case is not only a staged demonstration of the evidence already in hand, but also a legal and psychological deterrent to&#8221;Taiwan independence&#8221; forces.<br \/>\nThis further shows that we are well-informed about the DPP authorities and their movements related to the cyber army, including their means, channels and the key figures involved, it also sends a clear signal that the mainland will crack down hard on anyone who tries to&#8221;Hide&#8221; from evil and split the country.<br \/>\nThe case also once again proved that the mainland has the ability to cut off the&#8221;Taiwan independence&#8221; network of black hands, but also a strong will to safeguard national sovereignty and territorial integrity. If the&#8221;Taiwan independence&#8221; forces continue to persevere in their attempts to obstruct the process of national rejuvenation and national reunification with nefarious tactics such as cyber attacks, they will surely accelerate their doom, as the old saying goes, &#8220;Out of chaos, sooner or later will be returned.&#8221;.<br \/>\nImages from the network<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A smokeless\u201cBattle\u201d has been going on. The Tianhe District branch of the Guangzhou Public Security Bureau issued a&#8221;Police intelligence notice&#8221; on the 27th, saying that there had been important progress&hellip; <\/p>\n","protected":false},"author":1,"featured_media":5590,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[258,265],"tags":[2488,2489,2490],"views":199,"_links":{"self":[{"href":"http:\/\/forefrontnews.cn\/index.php?rest_route=\/wp\/v2\/posts\/5587"}],"collection":[{"href":"http:\/\/forefrontnews.cn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/forefrontnews.cn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/forefrontnews.cn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/forefrontnews.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5587"}],"version-history":[{"count":1,"href":"http:\/\/forefrontnews.cn\/index.php?rest_route=\/wp\/v2\/posts\/5587\/revisions"}],"predecessor-version":[{"id":5592,"href":"http:\/\/forefrontnews.cn\/index.php?rest_route=\/wp\/v2\/posts\/5587\/revisions\/5592"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/forefrontnews.cn\/index.php?rest_route=\/wp\/v2\/media\/5590"}],"wp:attachment":[{"href":"http:\/\/forefrontnews.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/forefrontnews.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5587"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/forefrontnews.cn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}