Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Exploring the closed nuclear fuel cycle: From recycling to fuel

Unmasking new TOAD attacks hidden in legitimate infrastructure

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » China-linked APT exploits Sitecore zero-day to attack critical U.S. infrastructure
Identity

China-linked APT exploits Sitecore zero-day to attack critical U.S. infrastructure

userBy userJanuary 16, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 16, 2026Ravi LakshmananZero Day/Cyber ​​Espionage

Threat actors believed to be aligned with China have been observed targeting critical infrastructure sectors in North America since at least the last year.

Cisco Talos, which is tracking this activity under the name UAT-8837, has assessed with medium confidence that this is a Chinese-aligned Advanced Persistent Threat (APT) actor based on tactical overlap with other campaigns launched by threat actors in the region.

The cybersecurity firm noted that based on observed tactics, techniques, and procedures (TTPs) and post-breach activity, threat actors are “primarily tasked with gaining initial access to high-value organizations.”

“After gaining initial access, either by successfully exploiting a vulnerable server or using compromised credentials, UAT-8837 primarily deploys open source tools to collect sensitive information such as credentials, security configurations, domain and Active Directory (AD) information, and create multiple access channels to victims,” ​​it added.

UAT-8837 is said to have recently gained initial access by exploiting a critical zero-day vulnerability in Sitecore (CVE-2025-53690, CVSS score: 9.0), and this intrusion shares similarities in TTPs, tools, and infrastructure with a campaign detailed by Google-owned Mandiant in September 2025.

cyber security

It is not clear whether these two clusters are the work of the same actor, but it suggests that UAT-8837 may have access to zero-day exploits to carry out cyberattacks.

Once the attacker has established a foothold on the target network, he conducts preliminary reconnaissance and then disables Remote Desktop Protocol (RDP) RestrictedAdmin. This is a security feature that prevents credentials and other user resources from being exposed to compromised remote hosts.

UAT-8837 is also said to open “cmd.exe” to perform actual keyboard operations on infected hosts and download several artifacts to enable post-exploitation attacks. Notable artifacts include:

GoTokenTheft, EarthWorm to steal access tokens, DWAgent to create a reverse tunnel to an attacker-controlled server using SOCKS, SharpHound to enable persistent remote access and Active Directory reconnaissance, Impacket to collect Active Directory information, GoExec to execute commands with elevated privileges, Rubeus, a Golang-based tool to execute commands on other connected remote endpoints in the victim’s network, Kerberos C#-based toolset for interactive exploitation Certipy, a tool for Active Directory detection and exploitation

Researchers Asheer Malhotra, Vitor Ventura, and Brandon White said, “UAT-8837 may execute a series of commands during a compromise to obtain credentials and other sensitive information from victim organizations.”

“For one victim organization, UAT-8837 exposed DLL-based shared libraries associated with the victim’s products, increasing the likelihood that these libraries will be trojanized in the future. This creates opportunities for supply chain compromise and reverse engineering to find vulnerabilities in those products.”

This disclosure comes a week after Talos determined that another China-linked threat actor, known as UAT-7290, used a family of malware including RushDrop, DriveSwitch, and SilentRaid to infiltrate organizations in South Asia and Southeast Europe for espionage purposes.

cyber security

In recent years, Western governments have issued several warnings over concerns that Chinese threat actors are targeting critical infrastructure. Earlier this week, cybersecurity and intelligence agencies in Australia, Germany, the Netherlands, New Zealand, the United Kingdom and the United States warned of growing threats to operational technology (OT) environments.

The guidance provides a framework for designing, securing, and managing OT system connections and requires organizations to limit exposure, centralize and standardize network connections, use secure protocols, harden OT boundaries, ensure all connections are monitored and logged, and avoid using outdated assets that can increase the risk of security incidents.

“Exposed insecure OT connections are known to be targeted by both opportunistic and highly capable attackers,” the agency said. “This activity involves state-sponsored actors actively targeting national critical infrastructure (CNI) networks. The threat is not limited to state-sponsored actors, and recent incidents demonstrate how exposed OT infrastructure is being opportunistically targeted by hacktivists.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCisco patches zero-day RCE exploited by China-linked APT in secure email gateway
Next Article 2025 was the third hottest year on record, Copernicus data warns
user
  • Website

Related Posts

Unmasking new TOAD attacks hidden in legitimate infrastructure

January 28, 2026

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

January 28, 2026

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Exploring the closed nuclear fuel cycle: From recycling to fuel

Unmasking new TOAD attacks hidden in legitimate infrastructure

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

Everything you need to know about the viral personal AI assistant Clawdbot (now Moltbot)

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.