Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

‘Wasn’t built right from the start’ — Musk’s xAI starts all over again

AI mental illness lawyer warns of risk of mass casualties

Digg lays off staff and closes app as company reorganizes

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » UAT-5918 Targeting critical infrastructure in Taiwan using webshells and open source tools
Identity

UAT-5918 Targeting critical infrastructure in Taiwan using webshells and open source tools

userBy userMarch 21, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 21, 2025Ravi LakshmananThreat Hunting/Vulnerability

The threat hunter has discovered a new threat actor named UAT-5918, which has been attacking Taiwan’s key infrastructure entities since at least 2023.

“UAT-5918 is a threat actor believed to be motivated by establishing long-term access for information theft and will use webshells and open source touring to carry out post-compromise activities to establish sustainability in the victim’s environment for information theft and qualification harvest.”

Cybersecurity

In addition to critical infrastructure, the verticals of other targets include information technology, communications, academia and healthcare.

UAT-5918 is said to share a tactical overlap with several Chinese hacking crews tracked as Bolt-time typhoons, Flax studs, Tropical Troopers, Earthestries and Dalbit, as rated as Dalbit.

The attack chain organized by the group involves gaining initial access by leveraging the flaws of N-Day security on less than Internet exposed web and application servers. Using scaffolds, several open source tools are dropped to carry out network reconnaissance, system information gathering, and lateral movements.

After the UAT-5918 explosion, the product involves the use of fast reverse proxy (FRP) and Neo-Regeorge, and sets up a reverse proxy tunnel to access compromised endpoints via attacker-controlled remote hosts.

Cybersecurity

Threat actors are leveraging tools such as browser-based extractors called Mimikatz, Lazagne, and Browserdatalite to harvest credentials to drill deeper holes into the target environment via RDP, WMIC, or impact. Chopper Web Shell, Cloud A, and Sparrow Door are also used. The latter two were previously used by another threat group called Earth Estries.

In particular, BrowserDatalite is designed to steal and steal history, browsing history from your web browser. Threat actors are also engaged in systematic data theft by enumerating local and shared drives to find data of interest.

“The activities we monitored suggest that post-company activities are done manually with the main goal of information theft,” the researchers said. “It obviously includes deploying a web shell across discovered subdomains and servers that are accessible to the Internet, opening multiple entry points to victim organizations.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMedusa ransomware uses malicious drivers to disable malware with stolen certificates
Next Article 1x will test humanoid robots in ‘hundred’ homes in 2025
user
  • Website

Related Posts

Chinese hackers target Southeast Asian militaries with AppleChris and MemFun malware

March 13, 2026

Meta to end Instagram’s end-to-end encrypted chat support starting May 2026

March 13, 2026

Interpol destroys 45,000 malicious IPs and arrests 94 people in global cybercrime investigation

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

‘Wasn’t built right from the start’ — Musk’s xAI starts all over again

AI mental illness lawyer warns of risk of mass casualties

Digg lays off staff and closes app as company reorganizes

Founded by father-son duo, Nyne provides AI agents with the human context they lack

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.