Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

EU project to accelerate hydrogen production in Norway

New RFP template for AI usage control and AI governance

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » China-linked UAT-7290 targets telecom companies with Linux malware and ORB nodes
Identity

China-linked UAT-7290 targets telecom companies with Linux malware and ORB nodes

userBy userJanuary 8, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 8, 2026Rabi LakshmananMalware/Threat Intelligence

A China-affiliated threat actor known as UAT-7290 is believed to be conducting espionage-based infiltrations against organizations in South Asia and Southeast Europe.

According to a Cisco Talos report published today, this activity cluster has been active since at least 2022 and primarily focuses on extensive technical reconnaissance of target organizations before launching attacks, ultimately leading to the deployment of malware families such as RushDrop, DriveSwitch, and SilentRaid.

Researchers Asheer Malhotra, Vitor Ventura, and Brandon White said, “In addition to UAT-7290 burrowing deep into victim companies’ network infrastructure and conducting espionage-focused attacks, its tactics, techniques, procedures (TTPs) and tools suggest that the attacker also established Operational Relay Box (ORB) nodes.”

“The ORB infrastructure could then be used for malicious operations by other Chinese-aligned actors. This means that UAT-7290 is playing a dual role not only as a threat actor for espionage purposes, but also as an initial access group.”

cyber security

Attacks by adversaries primarily target telecommunications providers in South Asia. However, a recent wave of intrusions has spread to attack organizations in Southeastern Europe.

UAT-7290’s sophistication is diverse and relies on a combination of open source malware, custom tools, and payloads for one-day vulnerabilities in popular edge networking products. Notable Windows implants used by threat actors include RedLeaves (also known as BUGJUICE) and ShadowPad. Both of these are exclusively associated with Chinese hacker groups.

That said, the group primarily relies on Linux-based malware suites, including:

RushDrop (also known as ChronosRAT), a dropper that initiates the infection chain DriveSwitch, a peripheral malware used to run SilentRaid on infected systems SilentRaid (also known as MystRodX), a C++-based implant that establishes persistent access to a compromised endpoint and takes a plugin-like approach to communicating with external servers, opening remote shells, configuring port forwarding, and performing file operations

It is worth noting that previous analysis by QiAnXin XLab flagged MystRodX as a variant of ChronosRAT. ChronosRAT is a modular ELF binary with shellcode execution, file management, keylogging, port forwarding, remote shell, screenshot capture, and proxy functionality. Palo Alto Networks Unit 42 is tracking a related threat cluster named CL-STA-0969.

cyber security

Also deployed by UAT-7290 is a backdoor called Bulbature that is designed to convert compromised edge devices into ORBs. This was first documented by Sekoia in October 2024.

The cybersecurity firm said the threat actor has overlapping tactics and infrastructure with China-linked adversaries known as Stone Panda and RedFoxtrot (also known as Nomad Panda).

“Threat actors perform extensive reconnaissance of target organizations before performing intrusions. UAT-7290 leverages one-day exploits and target-specific SSH brute force to compromise public-facing edge devices, gain initial access, and escalate privileges on compromised systems,” researchers said. “The attackers appear to be relying on publicly available proof-of-concept exploit code rather than developing their own.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy this VC thinks 2026 will be the “Year of the Consumer”
Next Article Your Last Breath is Just the Beginning: Inside TwinH’s Vision for an Eternal Legacy
user
  • Website

Related Posts

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

March 4, 2026

New RFP template for AI usage control and AI governance

March 4, 2026

Fake Laravel packages on Packagist deploy RAT on Windows, macOS, and Linux

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

EU project to accelerate hydrogen production in Norway

New RFP template for AI usage control and AI governance

Inside the EU’s military innovation push

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.