Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Partners with PayPal, PayPal and PayPal for Chat AI Shopping

Israeli attack on Gaza kills 70 when ceasefire talk continues | Israeli-Palestinian conflict news

Why offensive security training benefits the entire security team

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » UAT-5918 Targeting critical infrastructure in Taiwan using webshells and open source tools
Identity

UAT-5918 Targeting critical infrastructure in Taiwan using webshells and open source tools

userBy userMarch 21, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 21, 2025Ravi LakshmananThreat Hunting/Vulnerability

The threat hunter has discovered a new threat actor named UAT-5918, which has been attacking Taiwan’s key infrastructure entities since at least 2023.

“UAT-5918 is a threat actor believed to be motivated by establishing long-term access for information theft and will use webshells and open source touring to carry out post-compromise activities to establish sustainability in the victim’s environment for information theft and qualification harvest.”

Cybersecurity

In addition to critical infrastructure, the verticals of other targets include information technology, communications, academia and healthcare.

UAT-5918 is said to share a tactical overlap with several Chinese hacking crews tracked as Bolt-time typhoons, Flax studs, Tropical Troopers, Earthestries and Dalbit, as rated as Dalbit.

The attack chain organized by the group involves gaining initial access by leveraging the flaws of N-Day security on less than Internet exposed web and application servers. Using scaffolds, several open source tools are dropped to carry out network reconnaissance, system information gathering, and lateral movements.

After the UAT-5918 explosion, the product involves the use of fast reverse proxy (FRP) and Neo-Regeorge, and sets up a reverse proxy tunnel to access compromised endpoints via attacker-controlled remote hosts.

Cybersecurity

Threat actors are leveraging tools such as browser-based extractors called Mimikatz, Lazagne, and Browserdatalite to harvest credentials to drill deeper holes into the target environment via RDP, WMIC, or impact. Chopper Web Shell, Cloud A, and Sparrow Door are also used. The latter two were previously used by another threat group called Earth Estries.

In particular, BrowserDatalite is designed to steal and steal history, browsing history from your web browser. Threat actors are also engaged in systematic data theft by enumerating local and shared drives to find data of interest.

“The activities we monitored suggest that post-company activities are done manually with the main goal of information theft,” the researchers said. “It obviously includes deploying a web shell across discovered subdomains and servers that are accessible to the Internet, opening multiple entry points to victim organizations.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMedusa ransomware uses malicious drivers to disable malware with stolen certificates
Next Article 1x will test humanoid robots in ‘hundred’ homes in 2025
user
  • Website

Related Posts

Why offensive security training benefits the entire security team

May 14, 2025

Microsoft fixed 78 flaws and exploited five zero-days. CVSS 10 bug affects Azure DevOps servers

May 14, 2025

Fortinet Patches CVE-2025-32756 Zero-Day RCE Fault exploited in Fortivoice System

May 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Partners with PayPal, PayPal and PayPal for Chat AI Shopping

Israeli attack on Gaza kills 70 when ceasefire talk continues | Israeli-Palestinian conflict news

Why offensive security training benefits the entire security team

Glasgow Lab Unis converts 3D printing for space manufacturing

Trending Posts

Israeli attack on Gaza kills 70 when ceasefire talk continues | Israeli-Palestinian conflict news

May 14, 2025

Did Pakistan shoot down five Indian fighters? What we know | India and Pakistan tension news

May 14, 2025

“I need a banana”: In a spat in Malawi Tanzania, traders are left at Limbo | Trade War News

May 14, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

INE Security Alerts: Continuous CVE Practices Close the Important Gap Between Vulnerability Alerts and Effective Defense

Hot Labs secures $250,000 grant from the Stellar Foundation to accelerate innovation in chain abstraction

BC.Game announces new logos to enhance crypto integration for Igameing Ecosystem

Today’s Top Tech Startup Funding News on May 13, 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.