The Executive Yuan yesterday strongly condemned cyberattacks suspected to have been launched by a pro-Russia hacking group the previous day targeting the Taiwan Stock Exchange (TWSE), the Directorate-General of Budget, Accounting and Statistics (DGBAS) and several local financial institutions.
It assured the public that government agencies are closely monitoring the situation and have a firm understanding of the incident.
In a statement, Cabinet spokesperson Michelle Lee (李慧芝) said that the Executive Yuan strongly condemned reckless hacking attacks on countries including Taiwan.
Photo courtesy of a reader
Vice Premier Cheng Li-chiun (鄭麗君), who also heads the National Information and Communication Security Task Force, has requested that the Administration of Cyber Security (ACS) gather information about the cyberattacks and help agencies make prompt responses, Lee said.
While the government would continue to monitor how the cyberattacks evolve, it has also informed all of the agencies under the central and local governments that they should work together to defend themselves from possible further attacks, Lee said.
The statement was issued after the Web sites of the TWSE, the DGBAS and several major government-invested Taiwanese banks, including Mega Financial Holding Co (兆豐金控), and Chang Hwa Commercial Bank (彰化銀行), crashed due to cyberattacks on Thursday.
NoName057, a pro-Russia hacker group, has claimed that it launched distributed denial of service (DDoS) attacks on Taiwan’s government agencies, financial firms and even Taipei International Airport (Songshan airport).
The ACS on Thursday confirmed that the attacks were made through DDoS, referring to a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure.
The TWSE said that at about 3pm on Thursday, it found that a large number of foreign Internet protocol addresses launched invalid queries on its network, causing unstable services for a short period.
The TWSE said its global Web site returned to normal at 3:22pm and saw no impact on its operations or the local stock market.
Mega Financial said the Web sites of the firm and its securities, commercial bill and securities investment trust subsidiaries were attacked on Thursday afternoon, but the networks returned to normal soon after their quick response.
NoName057 is the pro-Russian hacktivist group behind Project DDoSia, a DDoS attack toolkit that targets entities criticizing Russia’s invasion of Ukraine.
The Liberty Times (sister paper of the Taipei Times) on Tuesday cited cybersecurity firm Radware as saying that the attacks appeared to be retaliation for comments made by President William Lai (賴清德) on Sept. 1 suggesting China should have a territorial dispute with Russia.
“If it is really about territorial integrity, why don’t they [China] take back the land that was signed away and occupied by Russia in the Treaty of Aigun?” Lai asked.
The Treaty of Aigun, which was signed in 1858 between the Russian Empire and the Qing Dynasty, ceded about 600,000km2 of land in Manchuria to Russia.
The government is continuing to monitor the cyberattacks, which appear to have achieved little, but are showing no sign of stopping, Minister of Digital Affairs Huang Yen-nun (黃彥男) told the Liberty Times yesterday.
The Ministry of Digital Affairs has implemented strong countermeasures since China’s 2022 DDoS offensive during then-US House of Representatives speaker Nancy Pelosi’s visit to Taiwan, an official said on condition of anonymity.
These efforts significantly increased the resource costs of DDoS attacks, requiring hackers to outspend Taiwanese defenders 20:1 to achieve success, they said, adding that most Chinese attacks during the presidential election were neutralized.
Information technology experts speculated that the nation is preventing DDoS attacks by denying servers with foreign IP addresses from connecting to Taiwanese networks without limiting Taiwanese access to the Internet.
This method known as "flow cleaning" is a speedy and cost-effective counter to DDoS attacks, said Cha Shi-cho (查士朝), professor of informational security at the National Taiwan University of Science and Technology.
Hackers mainly utilize foreign-based servers to conduct DDoS attacks, which leaves a footprint that could be easily tracked and identified by government agencies or private security firms, he said.
DDoS is an old and simple, but costly method that requires the attacker to commit enormous resources for temporary results, he said, adding that there is little need for alarm if these attacks did not compromise systems.
However, if the attackers gained control of corporate networkers, they could use the latter as a springboard to launch further attacks, which would be more difficult and expensive to defend against, he said.
Additional reporting by Hsu Tzu-ling
AIR DEFENSE: The Norwegian missile system has proved highly effective in Ukraine in its war against Russia, and the US has recommended it for Taiwan, an expert said The Norwegian Advanced Surface-to-Air Missile Systems (NASAMS) Taiwan ordered from the US would be installed in strategically important positions in Taipei and New Taipei City to guard the region, the Ministry of National Defense said in statement yesterday. The air defense system would be deployed in Taipei’s Songshan District (松山) and New Taipei City’s Tamsui District (淡水), the ministry said, adding that the systems could be delivered as soon as the end of this year. The US Defense Security Cooperation Agency has previously said that three NASAMS would be sold to Taiwan. The weapons are part of the 17th US arms sale to
SERIOUS ALLEGATIONS: The suspects formed spy networks and paramilitary groups to kill government officials during a possible Chinese invasion, prosecutors said Prosecutors have indicted seven retired military officers, members of the Rehabilitation Alliance Party, for allegedly obtaining funds from China, and forming paramilitary groups and assassination squads in Taiwan to collaborate with Chinese troops in a possible war. The suspects contravened the National Security Act (國家安全法) by taking photos and drawing maps of key radar stations, missile installations and the American Institute in Taiwan’s headquarters in Taipei, prosecutors said. They allegedly prepared to collaborate with China during a possible invasion of Taiwan, prosecutors said. Retired military officer Chu Hung-i (屈宏義), 62, a Republic of China Army Academy graduate, went to China
INSURRECTION: The NSB said it found evidence the CCP was seeking snipers in Taiwan to target members of the military and foreign organizations in the event of an invasion The number of Chinese spies prosecuted in Taiwan has grown threefold over a four-year period, the National Security Bureau (NSB) said in a report released yesterday. In 2021 and 2022, 16 and 10 spies were prosecuted respectively, but that number grew to 64 last year, it said, adding that the Chinese Communist Party (CCP) was working with gangs in Taiwan to develop a network of armed spies. Spies in Taiwan have on behalf of the CCP used a variety of channels and methods to infiltrate all sectors of the country, and recruited Taiwanese to cooperate in developing organizations and obtaining sensitive information
BREAKTHROUGH: The US is making chips on par in yield and quality with Taiwan, despite people saying that it could not happen, the official said Taiwan Semiconductor Manufacturing Co (TSMC, 台積電) has begun producing advanced 4-nanometer (nm) chips for US customers in Arizona, US Secretary of Commerce Gina Raimondo said, a milestone in the semiconductor efforts of the administration of US President Joe Biden. In November last year, the commerce department finalized a US$6.6 billion grant to TSMC’s US unit for semiconductor production in Phoenix, Arizona. “For the first time ever in our country’s history, we are making leading edge 4-nanometer chips on American soil, American workers — on par in yield and quality with Taiwan,” Raimondo said, adding that production had begun in recent