China-linked RedJuliett caught spying on multiple Taiwanese orgs

China-linked RedJuliett caught spying on multiple Taiwanese orgs

A suspected Chinese state-sponsored cyber-espionage group, tracked as ‘RedJuliett,’ has been targeting government, academic, technology, and diplomatic entities in Taiwan since at least November 2023, a new report from Recorded Future's Insikt Group revealed.

RedJuliett has exploited known vulnerabilities in network edge devices, such as firewalls, virtual private networks (VPNs), and load balancers, to gain initial access to their targets. RedJuliett is believed to operate from Fuzhou, China, the researchers said.

In addition to Taiwan, RedJuliett has expanded its operations to compromise organizations in Hong Kong, Malaysia, Laos, South Korea, the United States, Djibouti, Kenya, and Rwanda. The group’s cyber-espionage tactics have affected a broad spectrum of sectors in these regions, with 24 organizations confirmed to be compromised, including government bodies in Taiwan, Laos, Kenya, and Rwanda.

Furthermore, RedJuliett has conducted network reconnaissance and attempted exploitation against over 70 academic, government, think tank, and technology organizations in Taiwan, including several embassies.

RedJuliett’s attack tactics involve exploiting vulnerabilities in internet-facing devices and employing techniques such as Structured Query Language (SQL) injection and directory traversal exploits against web and SQL applications. The group’s initial access methods include the deployment of the China Chopper web shell to maintain persistence, along with other open-source web shells like devilzShell, AntSword, and Godzilla. Additionally, RedJuliett has been observed exploiting a Linux privilege escalation vulnerability known as Dirty Cow (CVE-2016-5195).

The group uses sophisticated tools, including Acunetix Web Application Security Scanners, for reconnaissance and attempted exploitation activities. After gaining initial access, RedJuliett often creates a SoftEther VPN bridge or client within the victim networks, allowing them to maintain a foothold and manage operational infrastructure through a mix of leased servers and compromised systems, notably from Taiwanese universities.

Back to the list

Latest Posts

AI chatbots fall for phishing scams

AI chatbots fall for phishing scams

The models provided the correct URL only 66% of the time; nearly 30% of responses pointed users to dead or suspended domains.
3 July 2025
Chinese hackers exploited Ivanti flaws in attacks against French government

Chinese hackers exploited Ivanti flaws in attacks against French government

ANSSI believes that the Houken campaign is operated by ‘UNC5174’, an entity believed to act as an initial access broker for China’s Ministry of State Security.
2 July 2025
Threat actors exploit Vercel's AI tool v0 to build sophisticated phishing pages

Threat actors exploit Vercel's AI tool v0 to build sophisticated phishing pages

The malicious actors used v0.dev to create fake login pages mimicking legitimate brands.
2 July 2025