Phish and Chips: China-Aligned Actors Target Taiwan Semiconductor Industry
Source report →Between March and June 2025, Proofpoint Threat Research identified three distinct China-aligned threat actors simultaneously targeting Taiwan’s semiconductor industry in espionage-driven campaigns. This activity reflects Beijing’s strategic priority to achieve semiconductor self-sufficiency amid U.S. and Taiwanese export controls, consistent with successive Five-Year Plans. Targeting intensity exceeded historical norms, with multiple previously untracked clusters entering the phishing landscape.
UNK_FistBump, exhibiting similarities to TA415 (APT41/Brass Typhoon), conducted spearphishing campaigns in May–June 2025. The actor impersonated a graduate student seeking employment to target HR and recruitment personnel across semiconductor manufacturing, packaging, testing, and supply chain organizations. It leveraged DLL side-loading to deploy Cobalt Strike and the Voldemort backdoor, establishing persistence in compromised networks. UNK_DropPitch, which shares infrastructure with TA415, operated in April–May 2025, targeting financial analysts covering Taiwan’s semiconductor and technology sectors at major investment banks. The actor sent phishing emails from attacker-controlled accounts, posing as a fictitious investment firm to solicit collaboration from targets. In June 2025, the actor expanded targeting to U.S. academic and think tank organizations. UNK_SparkyCarp conducted adversary-in-the-middle (AiTM) credential phishing in March 2025, targeting a Taiwanese semiconductor company previously targeted in November 2024. UNK_ColtCentury (overlapping with TAG-100 and Storm-2077) sent benign conversation-starter emails to legal personnel at a Taiwanese semiconductor firm in October 2024, likely as pre-positioning for SparkRAT deployment.
The convergence of multiple China-aligned clusters on a narrowly defined sector indicates coordinated intelligence collection priorities rather than opportunistic activity.
IOCs (53)
Scan your environment for IOCs →IP ADDRESS 11
166.88.61.3580.85.156.23482.118.16.7245.141.139.22280.85.156.23780.85.154.4831.192.234.9780.85.154.10180.85.157.11680.85.157.14582.118.16.106URL 11
https://sheets.googleapis.com:443/v4/spreadsheets/1z8ykHVYh9DF-b_BFDA9c4Q2ojfrgl-fq1v797Y5576Yhttps://sheets.googleapis.com:443/v4/spreadsheets/14H0Gm6xgc2p3gpIB5saDyzSDqpVMKGBKIdkVGh2y1bohttps://3008.filemail.com/api/file/get?filekey=DeHjMusPPgDt5EsWxOcgYCfRh5yI6MIIg7vvwn9yFEzh93Cts5UxrfXMYEPiMWffVCp36UCsVgYSlC47WGdjHZ7m9bAw0QWcgqQZcg&pk_vid=007318ac7ca53d8717482475404ed5a2https://api.moctw.info/Intro.pdfhttps://api.moctw.info/Document-2025.4.25.pdfhttps://api.moctw.info/Install.ziphttps://brilliant-bubblegum-137cfe.netlify.app/files/Introduction%20Document.ziphttps://ttot.accshieldportal.com/v3/ls/click/?c=b5c64761https://aqrm.accshieldportal.com/v2/account/validate/?vid=35f46f46https://acesportal.com/T/bfzWhbhttps://acesportal.com/T/KRfzAHEMAIL 5
john.doe89e@gmail.comamelia_w_chavez@proton.melisan_0818@outlook.commenglunwuluegg226@proton.melonelyboymaoxcz231@proton.meSHA256 FILE HASH 21
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 5
moctw.infoema.moctw.infowww.twmoc.infoaccshieldportal.comacesportal.comDetections (10)
Enable detections →Instantly deploy these through Vega.
- Malware Email Delivered Through Defenses
- User Clicked Through Safe Links Protection
- Malicious Email Attachment
- Registry Run Key Persistence
- VBScript from Office Applications
- Execution of Internet-Downloaded File
- C2 Beacon Over HTTP/S to Rare Domain
- Anomalous Encrypted C2 Channel
- Unauthorized Remote Access Tool
- Unsanctioned Proxy or VPN Traffic