← All briefs
high April 27, 2026

Phish and Chips: China-Aligned Actors Target Taiwan Semiconductor Industry

Source report →

Between March and June 2025, Proofpoint Threat Research identified three distinct China-aligned threat actors simultaneously targeting Taiwan’s semiconductor industry in espionage-driven campaigns. This activity reflects Beijing’s strategic priority to achieve semiconductor self-sufficiency amid U.S. and Taiwanese export controls, consistent with successive Five-Year Plans. Targeting intensity exceeded historical norms, with multiple previously untracked clusters entering the phishing landscape.

UNK_FistBump, exhibiting similarities to TA415 (APT41/Brass Typhoon), conducted spearphishing campaigns in May–June 2025. The actor impersonated a graduate student seeking employment to target HR and recruitment personnel across semiconductor manufacturing, packaging, testing, and supply chain organizations. It leveraged DLL side-loading to deploy Cobalt Strike and the Voldemort backdoor, establishing persistence in compromised networks. UNK_DropPitch, which shares infrastructure with TA415, operated in April–May 2025, targeting financial analysts covering Taiwan’s semiconductor and technology sectors at major investment banks. The actor sent phishing emails from attacker-controlled accounts, posing as a fictitious investment firm to solicit collaboration from targets. In June 2025, the actor expanded targeting to U.S. academic and think tank organizations. UNK_SparkyCarp conducted adversary-in-the-middle (AiTM) credential phishing in March 2025, targeting a Taiwanese semiconductor company previously targeted in November 2024. UNK_ColtCentury (overlapping with TAG-100 and Storm-2077) sent benign conversation-starter emails to legal personnel at a Taiwanese semiconductor firm in October 2024, likely as pre-positioning for SparkRAT deployment.

The convergence of multiple China-aligned clusters on a narrowly defined sector indicates coordinated intelligence collection priorities rather than opportunistic activity.

IP ADDRESS 11
166.88.61.35
80.85.156.234
82.118.16.72
45.141.139.222
80.85.156.237
80.85.154.48
31.192.234.97
80.85.154.101
80.85.157.116
80.85.157.145
82.118.16.106
URL 11
https://sheets.googleapis.com:443/v4/spreadsheets/1z8ykHVYh9DF-b_BFDA9c4Q2ojfrgl-fq1v797Y5576Y
https://sheets.googleapis.com:443/v4/spreadsheets/14H0Gm6xgc2p3gpIB5saDyzSDqpVMKGBKIdkVGh2y1bo
https://3008.filemail.com/api/file/get?filekey=DeHjMusPPgDt5EsWxOcgYCfRh5yI6MIIg7vvwn9yFEzh93Cts5UxrfXMYEPiMWffVCp36UCsVgYSlC47WGdjHZ7m9bAw0QWcgqQZcg&pk_vid=007318ac7ca53d8717482475404ed5a2
https://api.moctw.info/Intro.pdf
https://api.moctw.info/Document-2025.4.25.pdf
https://api.moctw.info/Install.zip
https://brilliant-bubblegum-137cfe.netlify.app/files/Introduction%20Document.zip
https://ttot.accshieldportal.com/v3/ls/click/?c=b5c64761
https://aqrm.accshieldportal.com/v2/account/validate/?vid=35f46f46
https://acesportal.com/T/bfzWhb
https://acesportal.com/T/KRfzAH
EMAIL 5
john.doe89e@gmail.com
amelia_w_chavez@proton.me
lisan_0818@outlook.com
menglunwuluegg226@proton.me
lonelyboymaoxcz231@proton.me
SHA256 FILE HASH 21
1a2530010ecb11f0ce562c0db0380416a10106e924335258ccbba0071a19c852
084b92365a25e6cd5fc43efe522e5678a2f1e307bf69dd9a61eb37f81f304cc6
85e4809e80e20d9a532267b22d7f898009e74ed0dbf7093bfa9a8d2d5403f3f9
338f072cc1e08f1ed094d88aa398472e3f04a8841be2ff70f1c7a2e4476d8ef7
13fad7c6d0accb9e0211a7b26849cf96c333cf6dfa21b40b65a7582b79110e4b
d783c40c0e15b73b62f28d611f7990793b7e5ba2436e203000a22161e0a00d0e
1016ba708fb21385b12183b3430b64df10a8a1af8355b27dd523d99ca878ffbb
bab8618bc6fc3fdfa7870b5fe0f52b570fabf0243d066f410a7e76ebeed0088c
0d992762c69d624a1f14a8a230f8a7d36d190b49e787fd146e9010e943c5ef78
ec5fef700d1ed06285af1f2d01fa3db5ea924de3c2da2f0e6b7a534f69d8409c
82ecfe0ada6f7c0cea78bca2e8234241f1a1b8670b5b970df5e2ee255c3a56ef
cd009ea4c682b61963210cee16ed663eee20c91dd56483d456e03726e09c89a7
bbdad59db64c48f0a9eb3e8f2600314b0e3ebd200e72fa96bf5a84dd29d64ac5
fc8f7185a90af4bf44332e85872aa7c190949e3ec70055a38af57690b6604e3c
7bffd21315e324ef7d6c4401d1bf955817370b65ae57736b20ced2c5c08b9814
9b2cbcf2e0124d79130c4049f7b502246510ab681a3a84224b78613ef322bc79
4ee77f1261bb3ad1d9d7114474a8809929f4a0e7f9672b19048e1b6ac7acb15c
d3a71c6b7f4be856e0cd66b7c67ca0c8eef250bc737a648032d9d67c2c37d911
366d7de8a941daa6a303dc3e39af60b2ffacaa61d5c1fb84dd1595a636439737
d51c195b698c411353b10d5b1795cbc06040b663318e220a2d121727c0bb4e43
ffd69146c5b02305ac74c514cab28d5211a473a6c28d7366732fdc4797425288
DOMAIN 5
moctw.info
ema.moctw.info
www.twmoc.info
accshieldportal.com
acesportal.com

Detections (10)

Enable detections →

Instantly deploy these through Vega.

  • Malware Email Delivered Through Defenses
  • User Clicked Through Safe Links Protection
  • Malicious Email Attachment
  • Registry Run Key Persistence
  • VBScript from Office Applications
  • Execution of Internet-Downloaded File
  • C2 Beacon Over HTTP/S to Rare Domain
  • Anomalous Encrypted C2 Channel
  • Unauthorized Remote Access Tool
  • Unsanctioned Proxy or VPN Traffic