China may be rehearsing a digital siege, Taiwan warns
Summary
At the Munich Cyber Security Conference, Yuh-Jye Lee, a senior adviser at Taiwan’s National Security Council, warned that China appears to be practising disruptive cyber operations against critical infrastructure. Leaked technical documents reviewed by Recorded Future News describe a suspected Chinese cyber-training platform called “Expedition Cloud” that reportedly recreates rival countries’ power grids, transport and communications systems so attack teams can rehearse and refine techniques. Taiwan — already heavily targeted by phishing, intrusions and mapping of its networks — may be being used as a real-world proving ground rather than merely a source of intelligence.
Key Points
- Yuh-Jye Lee warned operations like Volt Typhoon could be tests to paralyse infrastructure, not just espionage.
- Leaked documents describe “Expedition Cloud,” a platform allegedly built to simulate real national infrastructure for rehearsing attacks.
- Taiwan faces persistent targeting: phishing against ministries, intrusions into utilities and detailed digital mapping.
- Shift from data theft to disruption: rehearsals aim to identify tactics that can cause outages or paralysis.
- If accurate, these activities show a deliberate move toward offensive cyber preparations against adversary infrastructure.
- Implications extend beyond Taiwan — allied networks and critical services worldwide could be at risk.
Context and relevance
This story sits at the intersection of geopolitics and cyber resilience. Nation-state groups have increasingly focused on capabilities that can disrupt societies, not just steal data. A training environment like Expedition Cloud, if genuine, would lower the technical and operational barriers to launching large-scale disruptive operations. For governments, operators of critical infrastructure and security teams, this points to a need for hardened defences, cross-border intelligence sharing and contingency planning for service outages caused by cyberattacks.
Why should I read this?
Short version: pay attention. This isn’t just another leak — it suggests a step-change from spying to practising real-world disruption. If you work in national security, infrastructure, or cyber ops (or rely on those services), the tactics being rehearsed could hit you first. We’ve skimmed the detail so you don’t have to — but if your systems matter, read the full piece and check your defences.
Source
Source: https://therecord.media/china-taiwan-digital-siege-munich
