The Japanese National Police Agency (NPA) has reported 210 such incursions since 2019, fueling calls for tougher legal frameworks and closer international coordination to protect critical infrastructure.
The NPA identified the hacker group MirrorFace, which shares traits with Advanced Persistent Threat 10, or APT10, a group linked to China’s Ministry of State Security. The agency noted that the timing of the cyberattacks frequently coincided with standard working hours in China and excluded Chinese holidays, leading authorities to believe that the Chinese Communist Party (CCP) has been supporting such attacks.
The NPA has observed that these increasing cyberattacks have been carried out in three phases.
The first phase lasted from December 2019 to July 2023. Government entities, think tanks, and the media were primarily targeted, indicating an attempt to sway policy and public sentiment.
The second phase, from February to October 2023, marked a shift toward semiconductors, manufacturing, and academic institutions, focusing on Japan’s technological hub.
The third phase, starting in June 2024, has seen a resurgence in targeting academia, politicians, and the media, reflecting an ongoing effort to influence public discourse and shape policies.
Japan’s 2024 Defense White Paper found that the Chinese military’s cyber warfare unit had emerged from the former Strategic Support Force, which had around 175,000 personnel, including 30,000 dedicated to cyberattacks
A high-profile target was the Japan Aerospace Exploration Agency (JAXA). Hackers exploited VPN vulnerabilities to break into its Microsoft 365 Cloud service, compromising around 200 employee accounts and exfiltrating over 10,000 files between 2023 and 2024, according to Japanese media.
Among the stolen data were details on JAXA’s Martian Moons Exploration (MMX) mission, part of the agency’s manned lunar program. This raises concerns about China using this information to advance its own Mars endeavors.
In response to ongoing threats, Japan established a dedicated Cyber Defense Unit in March 2022 to monitor government networks around the clock. In the following year, Japan and the United States agreed to strengthen cybersecurity cooperation at the highest levels.
Su Tzu-yun, director of Taiwan’s Institute for National Defense and Security Research, recently told the Chinese edition of The Epoch Times that such measures would only be effective if they are backed by stronger legal frameworks and closer international coordination.
Similar CCP-backed cyberattacks have occurred in the United States in recent years.
In 2024, the Salt Typhoon hacking group, backed by China’s Ministry of State Security, stood out as the most serious threat, among others. It has compromised at least eight major U.S. telecom companies.
Last March, the U.S. Department of Justice unsealed the indictment of seven Chinese nationals linked to a group called APT31 for cyber espionage targeting the defense, IT, and energy sectors, aiming to steal data and enable future attacks.
No comments:
Post a Comment