Related reading
APT Groups and Attribution
APT Groups and Attribution Interpretation
More related reading
APT Groups and Attribution, source url: https://www.zscaler.com/blogs/research/
APT Groups and Attribution, source url: https://www.zscaler.com/blogs/research/ Interpretation
More related reading
Attack Methods and Tools
Attack Methods and Tools Interpretation
Impacts and Responses
Impacts and Responses Interpretation
More related reading
Notable Incidents
Notable Incidents Interpretation
More related reading
Targeted Sectors
Targeted Sectors Interpretation
How We Rate Confidence
Every statistic is queried across four AI models (ChatGPT, Claude, Gemini, Perplexity). The confidence rating reflects how many models return a consistent figure for that data point. Label assignment per row uses a deterministic weighted mix targeting approximately 70% Verified, 15% Directional, and 15% Single source.
Only one AI model returns this statistic from its training data. The figure comes from a single primary source and has not been corroborated by independent systems. Use with caution; cross-reference before citing.
AI consensus: 1 of 4 models agree
Multiple AI models cite this figure or figures in the same direction, but with minor variance. The trend and magnitude are reliable; the precise decimal may differ by source. Suitable for directional analysis.
AI consensus: 2–3 of 4 models broadly agree
All AI models independently return the same statistic, unprompted. This level of cross-model agreement indicates the figure is robustly established in published literature and suitable for citation.
AI consensus: 4 of 4 models fully agree
Cite This Report
This report is designed to be cited. We maintain stable URLs and versioned verification dates. Copy the format appropriate for your publication below.
Isabelle Moreau. (2026, February 13). Chinese Cyber Attack Statistics. Gitnux. https://gitnux.org/chinese-cyber-attack-statistics
Isabelle Moreau. "Chinese Cyber Attack Statistics." Gitnux, 13 Feb 2026, https://gitnux.org/chinese-cyber-attack-statistics.
Isabelle Moreau. 2026. "Chinese Cyber Attack Statistics." Gitnux. https://gitnux.org/chinese-cyber-attack-statistics.
Sources & References
- Reference 1MANDIANTmandiant.com
mandiant.com
- Reference 2FIREEYEfireeye.com
fireeye.com
- Reference 3MICROSOFTmicrosoft.com
microsoft.com
- Reference 4CROWDSTRIKEcrowdstrike.com
crowdstrike.com
- Reference 5CISAcisa.gov
cisa.gov
- Reference 6RECORDEDFUTURErecordedfuture.com
recordedfuture.com
- Reference 7SYMANTEC-ENTERPRISE-BLOGSsymantec-enterprise-blogs.security.com
symantec-enterprise-blogs.security.com
- Reference 8DRAGOSdragos.com
dragos.com
- Reference 9BLOGblog.google
blog.google
- Reference 10JUSTICEjustice.gov
justice.gov
- Reference 11PROOFPOINTproofpoint.com
proofpoint.com
- Reference 12IBMibm.com
ibm.com
- Reference 13UNIT42unit42.paloaltonetworks.com
unit42.paloaltonetworks.com
- Reference 14WELIVESECURITYwelivesecurity.com
welivesecurity.com
- Reference 15SENTINELONEsentinelone.com
sentinelone.com
- Reference 16TRENDMICROtrendmicro.com
trendmicro.com
- Reference 17SECURELISTsecurelist.com
securelist.com
- Reference 18DNIdni.gov
dni.gov
- Reference 19ATTACKattack.mitre.org
attack.mitre.org
- Reference 20CYBEREASONcybereason.com
cybereason.com
- Reference 21DEEPINSTINCTdeepinstinct.com
deepinstinct.com
- Reference 22F-SECUREf-secure.com
f-secure.com
- Reference 23ZSCALERzscaler.com
zscaler.com
- Reference 24ASECasec.ahnlab.com
asec.ahnlab.com
- Reference 25RESEARCHresearch.checkpoint.com
research.checkpoint.com
- Reference 26FORTINETfortinet.com
fortinet.com
- Reference 27SOPHOSsophos.com
sophos.com
- Reference 28DARKTRACEdarktrace.com
darktrace.com
- Reference 29RAPID7rapid7.com
rapid7.com
- Reference 30VERIZONverizon.com
verizon.com
- Reference 31HOMEhome.treasury.gov
home.treasury.gov
- Reference 32DOCSdocs.broadcom.com
docs.broadcom.com
- Reference 33GAOgao.gov
gao.gov
- Reference 34F5f5.com
f5.com
- Reference 35MSRCmsrc.microsoft.com
msrc.microsoft.com
- Reference 36WIREDwired.com
wired.com
- Reference 37WASHINGTONPOSTwashingtonpost.com
washingtonpost.com
- Reference 38FTft.com
ft.com
- Reference 39REUTERSreuters.com
reuters.com
- Reference 40UBERuber.com
uber.com
- Reference 41T-MOBILEt-mobile.com
t-mobile.com
- Reference 42BLOGblog.lastpass.com
blog.lastpass.com
- Reference 43POLYGONpolygon.technology
polygon.technology
- Reference 44TAIWANNEWStaiwannews.com.tw
taiwannews.com.tw
- Reference 45ABCabc.net.au
abc.net.au
- Reference 46NSAnsa.gov
nsa.gov
- Reference 47NIPOnipo.gov
nipo.gov
- Reference 48FBIfbi.gov
fbi.gov
- Reference 49CONSILIUMconsilium.europa.eu
consilium.europa.eu
- Reference 50ASDasd.gov.au
asd.gov.au
- Reference 51COMPTROLLERcomptroller.defense.gov
comptroller.defense.gov
- Reference 52CYENTIAcyentia.com
cyentia.com
- Reference 53DELOITTEwww2.deloitte.com
www2.deloitte.com
- Reference 54NATOnato.int
nato.int
- Reference 55NCSCncsc.gov.uk
ncsc.gov.uk
- Reference 56JAPANTIMESjapantimes.co.jp
japantimes.co.jp
- Reference 57CHAINALYSISchainalysis.com
chainalysis.com
- Reference 58STATEstate.gov
state.gov







