← Back to Tech & Science

State-Linked Group Targets Taiwanese NGOs with LucidRook Malware

Tech & ScienceAI-Generated & Algorithmically Scored··1 UPDATE

AI-generated from multiple sources. Verify before acting on this reporting.

Update

TAIPEI — Additional reports have emerged corroborating the initial findings regarding the cyber espionage campaign targeting Taiwanese non-governmental organizations. The new information confirms the scope and nature of the intrusion attempts previously identified. Security analysts note that the corroborating evidence strengthens the understanding of the group's operational methods and the specific targets within the civil society sector. The campaign continues to be monitored closely as researchers work to assess the full extent of the compromise. No new malware variants or additional attack vectors have been reported at this time. The focus remains on the original group identified in the initial report, with no indication of involvement from other state-linked actors. Authorities in Taiwan are reviewing the new data to determine potential impacts on national security and the integrity of communications within the targeted organizations.

Original Report —

TAIPEI — A state-linked cyber espionage group known as UAT-10362 has launched a targeted campaign against non-governmental organizations in Taiwan, deploying the LucidRook malware through spear-phishing attacks.

The campaign, detected on April 9, 2026, focuses on civil society groups operating within the island nation. Security researchers identified the intrusion attempts as part of a broader effort to compromise sensitive communications and internal networks of targeted entities. The group, previously associated with operations originating from China, utilized customized phishing emails to distribute the malicious payload.

LucidRook, a remote access trojan, grants attackers persistent access to infected systems. Once installed, the malware can exfiltrate data, monitor user activity, and establish command-and-control channels. The attacks specifically targeted organizations involved in human rights advocacy, cross-strait relations, and policy research. No confirmed data breaches have been reported as of the initial detection.

Cybersecurity firms noted the sophistication of the phishing lures, which mimicked official correspondence from government agencies and international partners. The emails contained malicious attachments that, when opened, executed the malware without triggering standard antivirus defenses. The campaign represents a shift in targeting strategies, moving from government infrastructure to civil society actors.

Taiwan’s National Security Bureau has not issued a public statement regarding the specific incidents. However, officials have previously warned of increasing cyber threats against domestic organizations. The timing of the attacks coincides with heightened diplomatic tensions in the region, though no direct link has been established between the campaign and current geopolitical events.

UAT-10362 has been active since 2020, conducting similar operations against academic institutions and media outlets. The group’s tactics have evolved over time, incorporating social engineering techniques to bypass security protocols. Experts suggest the focus on NGOs may indicate an intent to gather intelligence on grassroots movements or influence public discourse.

The malware’s capabilities include keylogging, screen capture, and file encryption, allowing for comprehensive surveillance of compromised systems. Researchers have identified several command-and-control servers linked to the campaign, though their locations remain unconfirmed. The group appears to be operating with a high degree of operational security, limiting traceability.

Security vendors have released indicators of compromise to help organizations detect and mitigate the threat. Recommended measures include updating email filtering systems, training staff on phishing recognition, and isolating affected networks. The campaign underscores the growing vulnerability of non-state actors in the cyber domain.

Questions remain regarding the full scope of the operation and whether other sectors have been targeted. Investigators continue to analyze the malware’s code for additional capabilities. The long-term objectives of UAT-10362 in this campaign are unclear, leaving the extent of potential damage uncertain.