Kuboid
Open Luck·Kuboid.in

Taiwan Resilience Project: Critical Infrastructure Security

DEFCONConference317 views38:336 months ago

This talk presents a research project analyzing the cyber resilience of Taiwan's critical infrastructure, specifically focusing on communication and power systems. The research draws lessons from the conflict in Ukraine to evaluate vulnerabilities in subsea cable networks and power distribution. The speakers discuss strategies for improving national resilience through decentralized communication networks, redundant infrastructure, and civilian training programs.

Hardening Critical Infrastructure Against State-Level Network Isolation

TLDR: This research analyzes the cyber resilience of Taiwan’s critical infrastructure by modeling potential communication and power grid failures during a conflict. By examining the vulnerability of subsea cables and the reliance on centralized power distribution, the speakers demonstrate how state actors can achieve digital isolation. Pentesters and researchers should focus on the security of decentralized communication alternatives like mesh networks and satellite links to mitigate these systemic risks.

Modern penetration testing often focuses on the application layer or internal network lateral movement, but we rarely stop to consider the physical and systemic dependencies that keep our targets online. The research presented at DEF CON 2025 regarding Taiwan’s critical infrastructure provides a sobering look at how easily a nation can be digitally severed from the global internet. When we talk about Denial of Service, we usually mean a saturated pipe or a crashed service. In the context of national infrastructure, this means the physical destruction of subsea cables and the targeted disruption of power grids that support regional switching centers.

The Mechanics of National-Scale Network Isolation

The primary attack vector discussed is the physical and logical isolation of an island nation. Taiwan’s connectivity relies heavily on a limited number of subsea cables. If these are severed, the country faces an immediate communication blackout. Unlike a standard enterprise environment where you might have redundant ISPs, national infrastructure is constrained by the physical geography of these cable landing stations.

From a research perspective, the vulnerability here is not just the cable itself, but the centralized nature of the switching equipment that terminates these connections. If an adversary can gain access to the management interfaces of these landing stations, they can effectively black-hole traffic before it ever reaches the domestic ISP backbone. This is a supply chain and infrastructure vulnerability that most security teams are not equipped to audit.

Decentralization as a Defensive Primitive

The most compelling part of this research is the shift toward decentralized communication. When the primary fiber backbone is compromised, the only remaining options are low-bandwidth, high-resilience alternatives. The speakers highlighted the role of Ham Radio and Mesh Networks as critical fallbacks.

For a researcher, this is an interesting space to explore. If you are testing a client that operates critical infrastructure, you should be asking: what happens when the WAN goes down? If the organization relies on cloud-based authentication or centralized management, they are effectively offline. The shift toward Starlink and other satellite-based backhauls is a direct response to this threat, but these technologies introduce their own set of vulnerabilities, including potential signal jamming and the security of the ground station hardware.

Assessing Systemic Risk in Engagement

When you are performing a red team engagement for a large organization, you are likely looking for ways to escalate privileges or exfiltrate data. However, the next step in maturity is to look at the "blast radius" of your findings. If you find a vulnerability in a power management system or a remote access gateway for a utility provider, you aren't just looking at a potential data breach. You are looking at a component that, if disabled, could contribute to a wider systemic failure.

Consider the OWASP Top 10 categories, specifically A06:2021-Vulnerable and Outdated Components. In the context of critical infrastructure, this is often the most dangerous category. These systems are frequently running on legacy firmware that cannot be easily patched and often lacks basic authentication. If you encounter these systems during an assessment, document them not just as a finding, but as a critical dependency.

The Reality of Repair and Recovery

One of the most overlooked aspects of this talk was the logistical challenge of repair. We assume that if a cable is cut, it will be fixed. But the reality is that there are very few specialized ships capable of repairing subsea cables, and even fewer that are willing to operate in a contested environment. If an adversary can force a situation where repair is impossible, the "temporary" outage becomes a permanent state of isolation.

Defenders need to move away from the assumption that the network will always be there. This means implementing local, air-gapped backups of critical data and ensuring that operational technology (OT) can function in a degraded state. If your organization’s entire business logic is tied to a persistent connection to a central data center, you are already vulnerable.

The takeaway for the research community is clear. We need to start auditing the resilience of our infrastructure, not just the security of our code. Whether it is through the deployment of mesh networks or the hardening of satellite ground stations, the goal is to ensure that when the primary path is cut, the system doesn't just fail. It adapts. Start looking at the physical dependencies of your network architecture and ask yourself what happens when the fiber goes dark. The answer might be the most important finding of your career.

Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in