Introduction
Several emerging trends illustrate a quickly changing threat landscape across East Asia, with China conducting both widespread cyber and influence operations (IO), and North Korean cyber threat actors demonstrating increased sophistication.
First, Chinese state-affiliated cyber threat groups have shown particular focus on the South China Sea region, directing cyber espionage at governments and other critical entities that ring this maritime area. Meanwhile, China’s targeting of the US defense sector and probing of US infrastructure signals attempts to gain competitive advantages for China’s foreign relations and strategic military aims.
Second, China has become more effective at engaging social media users with IO in the past year. Chinese online influence campaigns have long relied on sheer volume to reach users through networks of inauthentic social media accounts. Since 2022, however, China-aligned social media networks have engaged directly with authentic users on social media, targeted specific candidates in content about US elections, and posed as American voters. Separately, China’s state-affiliated multilingual social media influencer initiative has successfully engaged target audiences in at least 40 languages and grown its audience to over 103 million.
Third, China has continued to scale up its IO campaigns in the past year, expanding efforts to new languages and new platforms to increase its global footprint. On social media, campaigns deploy thousands of inauthentic accounts across dozens of websites, spreading memes, videos, and messages in multiple languages. In online news media, Chinese state media is tactful and effective in positioning itself as the authoritative voice on international discourse on China, using a variety of means to exert influence in media outlets worldwide. One campaign pushed Chinese Communist Party (CCP) propaganda via localized news websites aimed at the Chinese diaspora in more than 35 countries.
Finally, North Korea—which, unlike China, lacks capability as a sophisticated influence actor—remains a formidable cyber threat. North Korea has shown a continued interest in intelligence collection and increasing tactical sophistication by leveraging cascading supply chain attacks and cryptocurrency theft, among other tactics.
Follow Microsoft Security