{"id":15410,"date":"2026-01-05T17:31:27","date_gmt":"2026-01-05T17:31:27","guid":{"rendered":"https:\/\/newestek.com\/?p=15410"},"modified":"2026-01-05T17:31:27","modified_gmt":"2026-01-05T17:31:27","slug":"taiwan-subjected-to-2-6-million-chinese-cyberattacks-a-day-in-2025","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15410","title":{"rendered":"Taiwan subjected to 2.6 million Chinese cyberattacks a day in 2025"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Taiwan\u2019s National Security Agency states that the number of Chinese cyberattacks against the country\u2019s critical infrastructure increased by 6% in 2025, averaging 2.6 million attacks per day, <a href=\"https:\/\/www.reuters.com\/world\/china\/chinese-cyberattacks-taiwan-infrastructure-averaged-26-million-day-2025-report-2026-01-05\/\" target=\"_blank\" rel=\"noreferrer noopener\">Reuters<\/a> reports.<\/p>\n<p>The attacks mainly targeted the energy sector, hospitals, banks and emergency services, and many of them were reportedly coordinated with Chinese military exercises and political events. For example, when the President and Vice President of Taiwan were giving speeches or attending international meetings.<\/p>\n<p>The attackers reportedly used methods such as denial-of-service (<a href=\"https:\/\/www.csoonline.com\/article\/571981\/ddos-attacks-definition-examples-and-techniques.html\">DDoS<\/a>) attacks and man-in-the-middle intrusions to steal data and disrupt operations. This includes the semiconductor industry and companies like TSMC.<\/p>\n<p>The Chinese government has repeatedly denied that it is behind any cyberattacks.<\/p>\n<p><em>This article originally appeared on <a href=\"https:\/\/computersweden.se\/article\/4112705\/taiwan-utsattes-for-26-miljoner-kinesiska-cyberattacker-om-dagen-under-2025.html\">ComputerSweden<\/a>.<\/em><\/p>\n<p>More on cyberattacks:<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.csoonline.com\/article\/4112729\/cybersecurity-firm-turns-tables-on-threat-actors-with-decoy-data-trap.html\">Cybersecurity firm turns tables on threat actors with decoy data trap<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/4109985\/iranian-apt-prince-of-persia-returns-with-new-malware-and-c2-infrastructure.html\">Iranian APT Prince of Persia returns with new malware and C2 infrastructure<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/4108158\/ink-dragon-threat-group-targets-iis-servers-to-build-stealthy-global-network.html\">\u2018Ink Dragon\u2019 threat group targets IIS servers to build stealthy global network<br \/><\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Taiwan\u2019s National Security Agency states that the number of Chinese cyberattacks against the country\u2019s critical infrastructure increased by 6% in 2025, averaging 2.6 million attacks per day, Reuters reports. The attacks mainly targeted the energy sector, hospitals, banks and emergency services, and many of them were reportedly coordinated with Chinese military exercises and political events. For example, when the President and Vice President of Taiwan&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15410\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15410","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15410"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15410\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}